[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Do not allow LPT port redirection

ID: oval:org.secpod.oval:def:8891Date: (C)2013-01-21   (M)2023-05-09
Class: COMPLIANCEFamily: windows




The Do not allow LPT port redirection machine setting should be configured correctly. Specifies whether to prevent the redirection of data to client LPT ports during a Remote Desktop Services session. You can use this setting to prevent users from mapping local LPT ports and redirecting data from the remote computer to local LPT port peripherals. By default, Remote Desktop Services allows this LPT port redirection. If the status is set to Enabled, users in a Remote Desktop Services session cannot redirect server data to the local LPT port. If the status is set to Disabled, LPT port redirection is always allowed. If the status is set to Not Configured, LPT port redirection is not specified at the Group Policy level. However, an administrator can still disable local LPT port redirection using the Remote Desktop Session Host Configuration tool. Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Do not allow LPT port redirection (2) KEY: HKLM\Software\Policies\Microsoft\Windows NT\Terminal Services\\fDisableLPT

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-11623-6
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-11623-6
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_Server_2008_R2

© SecPod Technologies