[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Allow Delegating Default Credentials with NTLM-only Server Authentication

ID: oval:org.secpod.oval:def:28346Date: (C)2015-10-08   (M)2023-07-04
Class: COMPLIANCEFamily: windows




This policy setting applies to applications using the Cred SSP component (for example: Terminal Server). This policy applies when server authentication was achieved via NTLM. If you enable this policy setting you can specify the servers to which the user's default credentials can be delegated (default credentials are those that you use when first logging on to Windows). If you disable or do not configure (by default) this policy setting, delegation of default credentials is not permitted to any machine. Note: The Allow Delegating Default Credentials with NTLM-only Server Authentication can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard is permitted when specifying the SPN. For Example: TERMSRV/host.humanresources.fabrikam.com Terminal server running on host.humanresources.fabrikam.com machine TERMSRV/* Terminal server running on all machines. TERMSRV/*.humanresources.fabrikam.com Terminal server running on all machines in .humanresources.fabrikam.com Fix: (1) GPO: Computer Configuration\Administrative Templates\System\Credentials Delegation!Allow Delegating Default Credentials with NTLM-only Server Authentication (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\CredentialsDelegation!AllowDefCredentialsWhenNTLMOnly

Platform:
Microsoft Windows Server 2012 R2
Reference:
CCE-37989-1
CPE    1
cpe:/o:microsoft:windows_server_2012::r2:x64
CCE    1
CCE-37989-1
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2012_R2

© SecPod Technologies