WN19-DC-000391 - Windows Server 2019 must be configured for certificate-based authentication for domain controllers.

Information

Active Directory domain services elevation of privilege vulnerability could allow a user rights to the system, such as administrative and other high-level capabilities.

Solution

Configure the registry value.
Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: SYSTEM\CurrentControlSet\Services\Kdc

Value Name: StrongCertificateBindingEnforcement

Value Type: REG_DWORD
Value: 0x00000001 (1) or 0x00000002 (2)

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V3R3_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3, CAT|II, CCI|CCI-000213, Rule-ID|SV-271428r1059563_rule, STIG-ID|WN19-DC-000391, Vuln-ID|V-271428

Plugin: Windows

Control ID: e6faf67b60135a4778ae9868ab5735acd654fc92e40735d85f1fa5f625f2e023