1.1.1.2.1.66 Set 'Interactive logon: Require smart card' to 'Disabled'

Information

Microsoft recommends that you use this setting, if appropriate to your environment and your organization's business requirements, to help protect end user computers. This policy setting requires users to log on to a computer with a smart card. Note: This setting applies to Windows 2000 computers, but it is not available through the Security Configuration Manager tools on these computers. It can be difficult to make users choose strong passwords, and even strong passwords are vulnerable to brute-force attacks if an attacker has sufficient time and computing resources.

Solution

To implement the recommended configuration state, set the following Group Policy setting to 0.

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon- Require smart card

Impact- All users of a computer with this setting enabled will have to use smart cards to log onto the local computer, which means that the organization will need a reliable public key infrastructure (PKI) as well as smart cards and smart card readers for these users. These requirements are significant challenges, because expertise and resources are required to plan for and deploy these technologies. However, Windows Server 2003 and later versions of Windows Server includes Certificate Services, a highly advanced service for implementing and managing certificates. When Certificate Services is combined with client computers that run Windows, features such as automatic user and computer enrollment and renewal become available. For more information about deploying Smart Cards with Windows Vista see the paper 'Windows Vista Smart Card Infrastructure' available for download at the Microsoft Web site (http-//www.microsoft.com/downloads/details.aspx?FamilyID=ac201438-3317-44d3-9638-07625fe397b9&displaylang=en).

See Also

https://workbench.cisecurity.org/files/42

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(11), CCE|CCE-8542-3

Plugin: Windows

Control ID: 4d2997e7285b418ddd0b563acb117e7c3cf407b5b3e1d1ac5a9aa20e2825baad