[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Network security: Force logoff when logon hours expire

ID: oval:org.secpod.oval:def:36538Date: (C)2016-08-05   (M)2022-12-02
Class: COMPLIANCEFamily: windows




This security setting determines whether to disconnect users who are connected to the local computer outside their user account;amp;apos;s valid logon hours. This setting affects the Server Message Block (SMB) component. When this policy is enabled, it causes client sessions with the SMB server to be forcibly disconnected when the client;amp;apos;s logon hours expire. If this policy is disabled, an established client session is allowed to be maintained after the client;amp;apos;s logon hours have expired. Default: Enabled. Counter Measure: If you disable this policy setting, a user could remain connected to the computer outside of their allotted logon hours. This security setting behaves as an account policy. For domain accounts, there can be only one account policy. The account policy must be defined in the Default Domain Policy, and it is enforced by the domain controllers that make up the domain. A domain controller always pulls the account policy from the Default Domain Policy Group Policy object (GPO), even if there is a different account policy applied to the organizational unit that contains the domain controller. By default, workstations and servers that are joined to a domain (for example, member computers) also receive the same account policy for their local accounts. However, local account policies for member computers can be different from the domain account policy by defining an account policy for the organizational unit that contains the member computers. Kerberos settings are not applied to member computers. Potential Impact: When a user;amp;apos;s logon time expires, SMB sessions will terminate. The user will be unable to log on to the computer until their next scheduled access time commences. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Force logoff when logon hours expire (2) REG: ### (3) WMI: ###

Platform:
Microsoft Windows 10
Reference:
CCE-42170-1
CCE    1
CCE-42170-1

© SecPod Technologies