WN12-CC-000132 - Users must be prevented from mapping local COM ports and redirecting data from the Remote Desktop Session Host to local COM ports. (Remote Desktop Services Role).

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Preventing the redirection of Remote Desktop session data to a client computer's COM ports helps reduce possible exposure of sensitive data.

Solution

Configure the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Device and Resource Redirection -> 'Do not allow COM port redirection' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002314, Rule-ID|SV-226224r794459_rule, STIG-ID|WN12-CC-000132, STIG-Legacy|SV-52224, STIG-Legacy|V-15997, Vuln-ID|V-226224

Plugin: Windows

Control ID: aa501e17a6b7de3d779ec8efff667abf18c6955590286544d06f50418ed0be9f