[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Deny Delegating Fresh Credentials

ID: oval:org.secpod.oval:def:29377Date: (C)2015-10-14   (M)2023-07-14
Class: COMPLIANCEFamily: windows




This policy setting applies to applications using the Cred SSP component (for example: Terminal Server). If you enable this policy setting you can specify the servers to which the user's fresh credentials can NOT be delegated (fresh credentials are those that you are prompted for when executing the application). If you disable or do not configure (by default) this policy setting, this setting does not specify any server. Note: The 'Deny Delegating Fresh Credentials' can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can NOT be delegated. The use of a single wildcard is permitted when specifying the SPN. For Example: TERMSRV/host.humanresources.fabrikam.com Terminal server running on host.humanresources.fabrikam.com machine TERMSRV/* Terminal server running on all machines. TERMSRV/*.humanresources.fabrikam.com Terminal server running on all machines in .humanresources.fabrikam.com This setting can be used in combination with 'Allow Delegating Fresh Credentials' to define exceptions for specific servers that are otherwise permitted when using wildcards in the 'Allow Delegating Fresh Credentials' server list. Fix: (1) GPO: Computer Configuration\Administrative Templates\System\Credentials Delegation!Deny Delegating Fresh Credentials (2) REG: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation!DenyFreshCredentials

Platform:
Microsoft Windows 8.1
Reference:
CCE-34375-6
CPE    1
cpe:/o:microsoft:windows_8.1
CCE    1
CCE-34375-6
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_8_1

© SecPod Technologies