Check: WN19-DC-000050
Microsoft Windows Server 2019 STIG:
WN19-DC-000050
(in versions v3 r2 through v1 r1)
Title
Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less. (Cat II impact)
Discussion
This setting determines the period of time (in days) during which a user's TGT may be renewed. This security configuration limits the amount of time an attacker has to crack the TGT and gain access. Satisfies: SRG-OS-000112-GPOS-00057, SRG-OS-000113-GPOS-00058
Check Content
This applies to domain controllers. It is NA for other systems. Verify the following is configured in the Default Domain Policy: Open "Group Policy Management". Navigate to "Group Policy Objects" in the Domain being reviewed (Forest >> Domains >> Domain). Right-click on the "Default Domain Policy". Select "Edit". Navigate to Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy. If the "Maximum lifetime for user ticket renewal" is greater than "7" days, this is a finding.
Fix Text
Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> "Maximum lifetime for user ticket renewal" to a maximum of "7" days or less.
Additional Identifiers
Rule ID: SV-205705r1016459_rule
Vulnerability ID: V-205705
Group Title: SRG-OS-000112-GPOS-00057
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001941 |
Implement replay-resistant authentication mechanisms for access to privileged accounts and/or non-privileged accounts. |
CCI-001942 |
The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts. |