STIGQter STIGQter: STIG Summary: Windows 10 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

The Windows Remote Management (WinRM) service must not use Basic authentication.

DISA Rule

SV-220865r654974_rule

Vulnerability Number

V-220865

Group Title

SRG-OS-000125-GPOS-00065

Rule Version

WN10-CC-000345

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Remote Management (WinRM) >> WinRM Service >> "Allow Basic authentication" to "Disabled".

Severity Override Guidance: The AO can allow the severity override if they have reviewed the overall protection. This would only be allowed temporarily for implementation as documented and approved.
….
Allowing Basic authentication to be used for the sole creation of Office 365 DoD tenants.
….
A documented mechanism and or script that can disable Basic authentication once administration completes.
….
Use of a Privileged Access Workstation (PAW) and adherence to the Clean Source principle for administration.

Check Contents

If the following registry value does not exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Policies\Microsoft\Windows\WinRM\Service\

Value Name: AllowBasic

Value Type: REG_DWORD
Value: 0

Vulnerability Number

V-220865

Documentable

False

Rule Version

WN10-CC-000345

Severity Override Guidance

If the following registry value does not exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Policies\Microsoft\Windows\WinRM\Service\

Value Name: AllowBasic

Value Type: REG_DWORD
Value: 0

Check Content Reference

M

Target Key

4072

Comments