Check: WN12-CC-000124
Microsoft Windows Server 2012/2012 R2 Member Server STIG:
WN12-CC-000124
(in versions v3 r7 through v2 r7)
Title
The Windows Remote Management (WinRM) client must not allow unencrypted traffic. (Cat II impact)
Discussion
Unencrypted remote access to a system can allow sensitive information to be compromised. Windows remote management connections must be encrypted to prevent this.
Check Content
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows\WinRM\Client\ Value Name: AllowUnencryptedTraffic Type: REG_DWORD Value: 0
Fix Text
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Remote Management (WinRM) -> WinRM Client -> "Allow unencrypted traffic" to "Disabled".
Additional Identifiers
Rule ID: SV-225397r877382_rule
Vulnerability ID: V-225397
Group Title: SRG-OS-000393-GPOS-00173
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002890 |
The information system implements cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. |
CCI-003123 |
The information system implements cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. |
Controls
Number | Title |
---|---|
MA-4 (6) |
Cryptographic Protection |