SHPT-00-000531 - SharePoint sites must not use NTLM.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to address this include protocols using nonce's or challenges (e.g., TLS, WS_Security), and time synchronous or challenge-response one-time authenticators.

SharePoint must not use NTLM in the authentication process.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

1. Using IIS Manager (IIS 7), navigate to view the SharePoint Web Application sites.
2. Select a SharePoint Web Application site to configure.
3. In the IIS section, double-click Authentication and select Windows Authentication.
4. Right-click Windows Authentication and select Providers.
5. Add Negotiate to the list in the Enabled Providers box.
6. Remove NTLM from the list in the Enabled Providers box.

See Also

http://iasecontent.disa.mil/stigs/zip/Oct2015/U_Sharepoint_2010_V1R7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001941, Rule-ID|SV-37822r3_rule, STIG-ID|SHPT-00-000531, Vuln-ID|V-29301

Plugin: Windows

Control ID: ec31dd0cea951786af2f633529b8700b1c9c275e976d2e0f340484e5835dbf70