WN19-SO-000180 - Windows Server 2019 unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Some non-Microsoft SMB servers only support unencrypted (plain-text) password authentication. Sending plain-text passwords across the network when authenticating to an SMB server reduces the overall security of the environment. Check with the vendor of the SMB server to determine if there is a way to support encrypted password authentication.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> 'Microsoft Network Client: Send unencrypted password to third-party SMB servers' to 'Disabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V2R8_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000197, Rule-ID|SV-205655r877396_rule, STIG-ID|WN19-SO-000180, STIG-Legacy|SV-103555, STIG-Legacy|V-93469, Vuln-ID|V-205655

Plugin: Windows

Control ID: 753e999c2e103f40efd184f8a0e24a7943c59c0342aafb8bc1e3a3ab817cafb2