Check: 5.117
Windows Vista STIG:
5.117
(in versions v6 r42 through v6 r41)
Title
Users must be prevented from connecting using Terminal Services. (Cat II impact)
Discussion
Allowing a Terminal Services session to a workstation enables another avenue of access that could be exploited. The system must be configured to prevent users from connecting to a computer using Terminal Services.
Check Content
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Policies\Microsoft\Windows NT\Terminal Services\ Value Name: fDenyTSConnections Type: REG_DWORD Value: 1
Fix Text
Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services -> Terminal Server -> Connections "Allow users to connect remotely using Terminal Services" to "Disabled.
Additional Identifiers
Rule ID: SV-14859r2_rule
Vulnerability ID: V-14248
Group Title: TS/RDS - Remote User Connections
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002314 |
The information system controls remote access methods. |
Controls
Number | Title |
---|---|
AC-17 (1) |
Automated Monitoring / Control |