WN19-DC-000060 - Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.

Information

This setting determines the maximum time difference (in minutes) that Kerberos will tolerate between the time on a client's clock and the time on a server's clock while still considering the two clocks synchronous. To prevent replay attacks, Kerberos uses timestamps as part of its protocol definition. For timestamps to work properly, the clocks of the client and the server need to be in sync as much as possible.

Satisfies: SRG-OS-000112-GPOS-00057, SRG-OS-000113-GPOS-00058

Solution

Configure the policy value in the Default Domain Policy for Computer Configuration >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> 'Maximum tolerance for computer clock synchronization' to a maximum of '5' minutes or less.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V3R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(8), 800-53|IA-2(9), CAT|II, CCI|CCI-001941, CCI|CCI-001942, Rule-ID|SV-205706r1016460_rule, STIG-ID|WN19-DC-000060, STIG-Legacy|SV-103537, STIG-Legacy|V-93451, Vuln-ID|V-205706

Plugin: Windows

Control ID: d62279deae84f73cbdfdae18452d3cb52391ca1fe70a8960d3196981d54eb09d