Check: WN12-CC-000133
Microsoft Windows Server 2012/2012 R2 Domain Controller STIG:
WN12-CC-000133
(in versions v3 r7 through v2 r7)
Title
Users must be prevented from mapping local LPT ports and redirecting data from the Remote Desktop Session Host to local LPT ports. (Remote Desktop Services Role). (Cat II impact)
Discussion
Preventing the redirection of Remote Desktop session data to a client computer's LPT ports helps reduce possible exposure of sensitive data.
Check Content
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fDisableLPT Type: REG_DWORD Value: 1
Fix Text
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> "Do not allow LPT port redirection" to "Enabled".
Additional Identifiers
Rule ID: SV-226225r852120_rule
Vulnerability ID: V-226225
Group Title: SRG-OS-000297-GPOS-00115
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002314 |
Employ automated mechanisms to control remote access methods. |
Controls
Number | Title |
---|---|
AC-17(1) |
Automated Monitoring / Control |