18.9.59.3.3.3 (L2) Ensure 'Do not allow LPT port redirection' is set to 'Enabled'

Information

This policy setting specifies whether to prevent the redirection of data to client LPT ports during a Remote Desktop Services session.
The recommended state for this setting is: Enabled.

Rationale:
In a more security-sensitive environment, it is desirable to reduce the possible attack surface. The need for LPT port redirection within a Remote Desktop session is very rare, so makes sense to reduce the number of unexpected avenues for data exfiltration and/or malicious code transfer.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled:
Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Do not allow LPT port redirection
Note: This Group Policy path is provided by the Group Policy template TerminalServer.admx/adml that is included with all versions of the Microsoft Windows Administrative Templates.

Impact:
Users in a Remote Desktop Services session will not be able to redirect server data to local (client) LPT ports.

Default Value:
Disabled. (Remote Desktop Services allows LPT port redirection.)

References:
1. CCE-34698-1

See Also

https://workbench.cisecurity.org/benchmarks/14249

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-4, CSCv6|9.1, CSCv7|9.2

Plugin: Windows

Control ID: 68301075532b8064b1e63aa7195c92cdbeb17fd6569588543a30b9c44cd81985