[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Do not allow LPT port redirection

ID: oval:org.secpod.oval:def:56694Date: (C)2019-07-05   (M)2023-07-04
Class: COMPLIANCEFamily: windows




Specifies whether to prevent the redirection of data to client LPT ports during a Remote Desktop Services session. You can use this setting to prevent users from mapping local LPT ports and redirecting data from the remote computer to local LPT port peripherals. By default, Remote Desktop Services allows this LPT port redirection. If the status is set to Enabled, users in a Remote Desktop Services session cannot redirect server data to the local LPT port. If the status is set to Disabled, LPT port redirection is always allowed. If the status is set to Not Configured, LPT port redirection is not specified at the Group Policy level. However, an administrator can still disable local LPT port redirection using the Remote Desktop Session Host Configuration tool. Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection!Do not allow LPT port redirection (2) REG: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services!fDisableLPT

Platform:
Microsoft Windows Server 2019
Reference:
CCE-93677-3
CPE    1
cpe:/o:microsoft:windows_server_2019
CCE    1
CCE-93677-3
XCCDF    3
xccdf_org.secpod_benchmark_general_Windows_2019
xccdf_org.secpod_benchmark_NIST_800_171_R2_Windows_2019
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_2019

© SecPod Technologies