[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Domain controller: Allow vulnerable Netlogon secure channel connections

ID: oval:org.secpod.oval:def:90041Date: (C)2023-05-30   (M)2023-12-12
Class: COMPLIANCEFamily: windows




This security setting determines whether the domain controller bypasses secure RPC for Netlogon secure channel connections for specified machine accounts. When deployed, this policy should be applied to all domain controllers in a forest by enabling the policy on the domain controllers OU. When the Create Vulnerable Connections list (allow list) is configured: - Given allow permission, the domain controller will allow accounts to use a Netlogon secure channel without secure RPC. - Given deny permission, the domain controller will require accounts to use a Netlogon secure channel with secure RPC which is the same as the default (not necessary).

Platform:
Microsoft Windows Server 2019
Reference:
CCE-99875-7
CPE    1
cpe:/o:microsoft:windows_server_2019
CCE    1
CCE-99875-7
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2019

© SecPod Technologies