[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Domain controller: Allow vulnerable Netlogon secure channel connections

ID: oval:org.secpod.oval:def:96119Date: (C)2023-12-27   (M)2023-12-27
Class: COMPLIANCEFamily: windows




This security setting determines whether the domain controller bypasses secure RPC for Netlogon secure channel connections for specified machine accounts. When deployed, this policy should be applied to all domain controllers in a forest by enabling the policy on the domain controllers OU. When the Create Vulnerable Connections list (allow list) is configured: - Given allow permission, the domain controller will allow accounts to use a Netlogon secure channel without secure RPC. - Given deny permission, the domain controller will require accounts to use a Netlogon secure channel with secure RPC which is the same as the default (not necessary).

Platform:
Microsoft Windows Server 2012
Reference:
CCE-99882-3
CPE    1
cpe:/o:microsoft:windows_server_2012:-
CCE    1
CCE-99882-3
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2012

© SecPod Technologies