[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110210

 
 

909

 
 

86021

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

Deny access to this computer from the network

ID: oval:org.secpod.oval:def:22845Date: (C)2015-01-07   (M)2018-07-10
Class: COMPLIANCEFamily: windows




This policy setting prohibits users from connecting to a computer from across the network, which would allow users to access and potentially modify data remotely. In high security environments, there should be no need for remote users to access data on a computer. Instead, file sharing should be accomplished through the use of network servers. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. Windows 8.1 and Windows Server 2012 R2 introduces a new pseudo group called ?Local Account? that any local-account logon gets in its token and that has been backported to Windows 7 and Window Server 2008 R2 and later versions that have KB 2871997 installed. Guests and Local Account should be denied network logon. Also, the Enterprise Admins and Domain Admins groups should also be denied all access on all clients and servers except for Domain Controllers and dedicated administrative workstations. Note The Enterprise Admins and Domain Admins groups are domain-specific and cannot be specified in generic baselines such as those in SCM. These must be manually added to the Group Policy setting. This policy setting prohibits users from connecting to a computer from across the network, which would allow users to access and potentially modify data remotely. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment!Deny access to this computer from the network (2) WMI: root\rsop\computer#RSOP_UserPrivilegeRight#AccountList#UserRight='SeDenyNetworkLogonRight' and precedence=1

Platform:
Microsoft Windows Server 2012 R2
Reference:
CCE-37954-5
CPE    1
cpe:/o:microsoft:windows_server_2012::r2:x64
CCE    1
CCE-37954-5
XCCDF    8
xccdf_org.secpod_benchmark_PCI_Windows_2012_R2
xccdf_org.secpod_benchmark_general_Windows_2012_R2
xccdf_org.secpod_benchmark_HIPAA_45CFR_164_Windows_Server_2012_R2
xccdf_org.secpod_benchmark_ISO27001_Windows_2012_R2
...

© SecPod Technologies