WN19-SO-000190 - Windows Server 2019 setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB server will only communicate with an SMB client that performs SMB packet signing.

Satisfies: SRG-OS-000423-GPOS-00187, SRG-OS-000424-GPOS-00188

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> 'Microsoft network server: Digitally sign communications (always)' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V2R7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002418, CCI|CCI-002421, Rule-ID|SV-205827r852529_rule, STIG-ID|WN19-SO-000190, STIG-Legacy|SV-103645, STIG-Legacy|V-93559, Vuln-ID|V-205827

Plugin: Windows

Control ID: 098cd9f7d1f3863746c4992931dc23269e4a69437efca28f30737d87e0340d0a