18.9.97.1.3 (L1) Ensure 'Disallow Digest authentication' is set to 'Enabled'

Information

This policy setting allows you to manage whether the Windows Remote Management (WinRM) client will not use Digest authentication.
The recommended state for this setting is: Enabled.

Rationale:
Digest authentication is less robust than other authentication methods available in WinRM, an attacker who is able to capture packets on the network where WinRM is running may be able to determine the credentials used for accessing remote hosts via WinRM.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled:
Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Client\Disallow Digest authentication
Note: This Group Policy path is provided by the Group Policy template WindowsRemoteManagement.admx/adml that is included with all versions of the Microsoft Windows Administrative Templates.

Impact:
The WinRM client will not use Digest authentication.

Default Value:
Disabled. (The WinRM client will use Digest authentication.)

References:
1. CCE-34778-1

See Also

https://workbench.cisecurity.org/files/2754

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-5, 800-53|SC-8, CSCv6|16.13, CSCv7|14.4, CSCv7|16.5

Plugin: Windows

Control ID: ec4239afed487e10e57b857f01c4e87a7333988512b7e56bee3c9045a9a1143e