[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Do not allow drive redirection

ID: oval:org.secpod.oval:def:8897Date: (C)2013-01-21   (M)2023-05-09
Class: COMPLIANCEFamily: windows




The Do not allow drive redirection machine setting should be configured correctly. Specifies whether to prevent the mapping of client drives in a Remote Desktop Services session (drive redirection). By default, an RD Session Host server maps client drives automatically upon connection. Mapped drives appear in the session folder tree in Windows Explorer or Computer in the format <driveletter> on <computername>. You can use this setting to override this behavior. If the status is set to Enabled, client drive redirection is not allowed in Remote Desktop Services sessions. If the status is set to Disabled, client drive redirection is always allowed. If the status is set to Not Configured, client drive redirection is not specified at the Group Policy level. However, an administrator can still disable client drive redirection by using the Remote Desktop Session Host Configuration tool. Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Do not allow drive redirection (2) KEY: HKLM\Software\Policies\Microsoft\Windows NT\Terminal Services\\fDisableCdm

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-11709-3
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-11709-3
XCCDF    3
xccdf_org.secpod_benchmark_general_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2008_R2

© SecPod Technologies