[Forgot Password]
Login  Register Subscribe

23631

 
 

123424

 
 

98218

 
 

909

 
 

79224

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Do not allow drive redirection

ID: oval:org.secpod.oval:def:27516Date: (C)2015-10-08   (M)2017-10-31
Class: COMPLIANCEFamily: windows




This policy setting prevents users from sharing the local drives on their client computers to Terminal Servers that they access. Mapped drives appear in the session folder tree in Windows Explorer in the following format: \\TSClient\<driveletter>$ If local drives are shared they are left vulnerable to intruders who want to exploit the data that is stored on them. This policy setting prevents users from sharing the local drives on their client computers to Terminal Servers that they access. Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection!Do not allow drive redirection (2) REG: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services!fDisableCdm

Platform:
Microsoft Windows Server 2012 R2
Reference:
CCE-36509-8
CPE    1
cpe:/o:microsoft:windows_server_2012::r2:x64
CCE    1
CCE-36509-8
XCCDF    3
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2012_R2
xccdf_org.secpod_benchmark_general_Windows_2012_R2
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2012_R2

© 2013 SecPod Technologies