Do not allow drive redirection
|ID: oval:org.secpod.oval:def:40318||Date: (C)2017-04-25 (M)2018-04-10|
|Class: COMPLIANCE||Family: windows|
This policy setting prevents users from sharing the local drives on their client computers to Terminal Servers that they access. Mapped drives appear in the session folder tree in Windows Explorer in the following format:
If local drives are shared they are left vulnerable to intruders who want to exploit the data that is stored on them.
Data could be forwarded from the user's Terminal Server session to the user's local computer without any direct user interaction.
Configure the Do not allow drive redirection setting to Enabled.
Drive redirection will not be possible.
(1) GPO: Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Do not allow drive redirection
(2) REG: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services!fDisableCdm
|Microsoft Windows Server 2016|