[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

Deny log on through Remote Desktop Services

ID: oval:org.secpod.oval:def:18942Date: (C)2014-05-29   (M)2018-07-10
Class: COMPLIANCEFamily: windows




The Deny log on through Remote Desktop Services user right should be assigned to the appropriate accounts. This policy setting determines whether users can log on as Terminal Services clients. After the baseline member server is joined to a domain environment, there is no need to use local accounts to access the server from the network. Domain accounts can access the server for administration and end-user processing. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on through Remote Desktop Services (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10878-7
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10878-7
XCCDF    5
xccdf_org.secpod_benchmark_HIPAA_45CFR_164_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_general_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_NIST_800_53_r4_Windows_2008_R2
...

© SecPod Technologies