InformationThis security setting determines the maximum amount of time (in hours) that a user's ticket-granting ticket (TGT) may be used.
The STIG recommended state for this setting is: 10 or fewer hours, but not 0.
If you configure the value for the Maximum lifetime for user ticket setting too high, users might be able to access network resources outside of their logon hours. Also, users whose accounts were disabled might continue to have access to network services with valid user tickets that were issued before their accounts were disabled. If you configure this value too low, ticket requests to the KDC may affect the performance of your KDC and present an opportunity for a DoS attack.
None - this is the default behavior.
SolutionTo establish the recommended configuration via GP, set the following UI path to 10 or fewer hours, but not 0:
Computer Configuration\Policies\Windows Settings\Security Settings\Account Policy\Kerberos Policy\Maximum lifetime for user ticket
Microsoft Windows Server 2019 Security Technical Implementation Guide:
Version 2, Release 1, Benchmark Date: November 13, 2020
Vul ID: V-205704
Rule ID: SV-205704r569188_rule
STIG ID: WN19-DC-000040
Severity: CAT II
Category: CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION
References: 800-53|CM-1, 800-53|CM-2, 800-53|CM-6, 800-53|CM-7, 800-53|CM-7(1), 800-53|CM-9, 800-53|SA-3, 800-53|SA-8, 800-53|SA-10, CSCv7|5.1
Control ID: fc55cde675dedf34e01841a60f255d435c1227c20ba019a047ed5ba28a180fec