[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Disallow Digest authentication

ID: oval:org.secpod.oval:def:40334Date: (C)2017-04-25   (M)2023-07-04
Class: COMPLIANCEFamily: windows




This policy setting allows you to manage whether the Windows Remote Management (WinRM) client will not use Digest authentication. If you enable this policy setting, the WinRM client will not use Digest authentication. If you disable or do not configure this policy setting, the WinRM client will use Digest authentication. Vulnerability: Digest authentication is less robust than other authentication methods available in WinRM, an attacker who is able to capture packets on the network where WinRM is running may be able to determine the credentials used for accessing remote hosts via WinRM. Counter Measure: Enable this policy setting. Potential Impact: If you enable this policy setting, the WinRM client will not use Digest authentication. If you disable or do not configure this policy setting, the WinRM client will use Digest authentication. Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Client\Disallow Digest authentication (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM\Client!AllowDigest

Platform:
Microsoft Windows Server 2016
Reference:
CCE-46014-7
CPE    1
cpe:/o:microsoft:windows_server_2016:::x64
CCE    1
CCE-46014-7
XCCDF    2
xccdf_org.secpod_benchmark_general_Windows_Server_2016
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2016

© SecPod Technologies