Check: 2.015
Windows 2008 Domain Controller STIG:
2.015
(in versions v6 r47 through v6 r35)
Title
File share permissions must be configured to remove the Everyone group. (Cat II impact)
Discussion
By default, the Everyone group is given full control to new file shares. When a share is created, permissions should be reconfigured to give the minimum access to those accounts that require it.
Check Content
Run the Computer Management Applet. Expand the “System Tools” object in the Tree window. Expand the “Shared Folders” object. Select the “Shares” object. Right click any user-created shares (ignore “Netlogon”, “Sysvol” and administrative shares; the system will prompt you if Properties are selected for administrative shares). Select Properties. Select the Share Permissions tab. If user-created file shares have not been reconfigured to remove ACL permissions from the “Everyone group”, then this is a finding. Note: Right clicking on “Computer” on the desktop or from the menu and selecting “Manage” will open Server Manager in Windows 2008, not Computer Management as in previous Windows versions. Note: On Application Servers, if regular users have write or delete permissions to shares containing application binary files (i.e. .exe, .dll, .cmd, etc.) this is a finding. Documentable: If shares created by applications require the "Everyone" group, this should be documented with the IAO.
Fix Text
Remove permissions from the Everyone group from locally-created file shares and assign them to authorized groups.
Additional Identifiers
Rule ID: SV-29213r2_rule
Vulnerability ID: V-3245
Group Title: File share ACLs
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001090 |
Prevent unauthorized and unintended information transfer via shared system resources. |
Controls
Number | Title |
---|---|
SC-4 |
Information in Shared Resources |