1.3.1 Ensure 'Enforce user logon restrictions' is set to 'Enabled' (STIG DC only)

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This security setting determines whether the Kerberos V5 Key Distribution Center (KDC) validates every request for a session ticket against the user rights policy of the user account. Validation of each request for a session ticket is optional, because the extra step takes time and it may slow network access to services.

The STIG recommended state for this setting is: Enabled.

Rationale:

If this policy setting is disabled, users might be granted session tickets for services that they do not have the right to use.

Impact:

None - this is the default behavior.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled:

Computer Configuration\Policies\Windows Settings\Security Settings\Account Policy\Kerberos Policy\Enforce user logon restrictions

Default Value:

Enabled.


Additional Information:

Microsoft Windows Server 2019 Security Technical Implementation Guide:
Version 2, Release 1, Benchmark Date: November 13, 2020

Vul ID: V-205702
Rule ID: SV-205702r569188_rule
STIG ID: WN19-DC-000020
Severity: CAT II

See Also

https://workbench.cisecurity.org/files/3345