[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-26073-7

Platform: cpe:/o:microsoft:windows_server_2012:-Date: (C)2022-08-12   (M)2023-07-04



This policy setting configures secure access to UNC paths. If you enable this policy, Windows only allows access to the specified UNC paths after fulfilling additional security requirements. Specify hardened network paths. In the name field, type a fully-qualified UNC path for each network resource. To secure all access to a share with a particular name, regardless of the server name, specify a server name of '*' (asterisk). For example, "\*NETLOGON". To secure all access to all shares hosted on a server, the share name portion of the UNC path may be omitted. For example, "\SERVER". In the value field, specify one or more of the following options, separated by commas: 'RequireMutualAuthentication=1': Mutual authentication between the client and server is required to ensure the client connects to the correct server. 'RequireIntegrity=1': Communication between the client and server must employ an integrity mechanism to prevent data tampering. 'RequirePrivacy=1': Communication between the client and the server must be encrypted to prevent third parties from observing sensitive data. You should require both Integrity and Mutual Authentication for any UNC paths that host executable programs, script files, or files that control security policies. Consider hosting files that do not require Integrity or Privacy on separate shares from those that absolutely need such security for optimal performance. For additional details on configuring Windows computers to require additional security when accessing specific UNC paths, visit http://support.microsoft.com/kb/3000483. Fix: (1) GPO: Computer ConfigurationAdministrative TemplatesNetworkNetwork ProviderHardened UNC Paths (2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindowsNetworkProviderHardenedPaths!\*NETLOGON (2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindowsNetworkProviderHardenedPaths!\*SYSVOL


Parameter:

[required configurations]


Technical Mechanism:

(1) GPO: Computer Configuration\Administrative Templates\Network\Network Provider\Hardened UNC Paths (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths!\\*\NETLOGON (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths!\\*\SYSVOL

CCSS Severity:CCSS Metrics:
CCSS Score : 9.8Attack Vector: NETWORK
Exploit Score: 3.9Attack Complexity: LOW
Impact Score: 5.9Privileges Required: NONE
Severity: CRITICALUser Interaction: NONE
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:82902


OVAL    1
oval:org.secpod.oval:def:82902
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2012

© SecPod Technologies