STIGQter STIGQter: STIG Summary: Microsoft Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide Version: 3 Release: 2 Benchmark Date: 04 May 2021:

Kerberos user logon restrictions must be enforced.

DISA Rule

SV-226065r569184_rule

Vulnerability Number

V-226065

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN12-AC-000010-DC

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the policy value in the Default Domain Policy for Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies -> Kerberos Policy -> "Enforce user logon restrictions" to "Enabled".

Check Contents

Verify the following is configured in the Default Domain Policy.

Open "Group Policy Management".
Navigate to "Group Policy Objects" in the Domain being reviewed (Forest > Domains > Domain).
Right click on the "Default Domain Policy".
Select Edit.
Navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Kerberos Policy.

If the "Enforce user logon restrictions" is not set to "Enabled", this is a finding.

Vulnerability Number

V-226065

Documentable

False

Rule Version

WN12-AC-000010-DC

Severity Override Guidance

Verify the following is configured in the Default Domain Policy.

Open "Group Policy Management".
Navigate to "Group Policy Objects" in the Domain being reviewed (Forest > Domains > Domain).
Right click on the "Default Domain Policy".
Select Edit.
Navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Kerberos Policy.

If the "Enforce user logon restrictions" is not set to "Enabled", this is a finding.

Check Content Reference

M

Target Key

4217

Comments