WN12-CC-000132 - Users must be prevented from mapping local COM ports and redirecting data from the Remote Desktop Session Host to local COM ports. (Remote Desktop Services Role).

Information

Preventing the redirection of Remote Desktop session data to a client computer's COM ports helps reduce possible exposure of sensitive data.

Solution

Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> 'Do not allow COM port redirection' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R7_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(1), CAT|II, CCI|CCI-002314, Rule-ID|SV-226224r852119_rule, STIG-ID|WN12-CC-000132, STIG-Legacy|SV-52224, STIG-Legacy|V-15997, Vuln-ID|V-226224

Plugin: Windows

Control ID: ed9c611cb0560d4bcaebb5ac502826842315e5d65eef7aec8fe8b47db6d5d63c