WN12-CC-000133 - Users must be prevented from mapping local LPT ports and redirecting data from the Remote Desktop Session Host to local LPT ports. (Remote Desktop Services Role).

Information

Preventing the redirection of Remote Desktop session data to a client computer's LPT ports helps reduce possible exposure of sensitive data.

Solution

Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> 'Do not allow LPT port redirection' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R7_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(1), CAT|II, CCI|CCI-002314, Rule-ID|SV-226225r852120_rule, STIG-ID|WN12-CC-000133, STIG-Legacy|SV-52226, STIG-Legacy|V-15998, Vuln-ID|V-226225

Plugin: Windows

Control ID: f715f89d7e242fa818eb04ebdda6ffb0afb7bb91ec49bb8a4048811bb12d0115