[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Deny log on through Remote Desktop Services

ID: oval:org.secpod.oval:def:18942Date: (C)2014-05-29   (M)2023-07-04
Class: COMPLIANCEFamily: windows




The Deny log on through Remote Desktop Services user right should be assigned to the appropriate accounts. This policy setting determines whether users can log on as Terminal Services clients. After the baseline member server is joined to a domain environment, there is no need to use local accounts to access the server from the network. Domain accounts can access the server for administration and end-user processing. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on through Remote Desktop Services (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10878-7
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10878-7
XCCDF    5
xccdf_org.secpod_benchmark_NIST_800_53_r4_Windows_2008_R2
xccdf_org.secpod_benchmark_HIPAA_45CFR_164_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_general_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2008_R2
...

© SecPod Technologies