WN12-AC-000012-DC - The Kerberos user ticket lifetime must be limited to 10 hours or less.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

In Kerberos, there are 2 types of tickets: Ticket Granting Tickets (TGTs) and Service Tickets. Kerberos tickets have a limited lifetime so the time an attacker has to implement an attack is limited. This policy controls how long TGTs can be renewed. With Kerberos, the user's initial authentication to the domain controller results in a TGT which is then used to request Service Tickets to resources. Upon startup, each computer gets a TGT before requesting a service ticket to the domain controller and any other computers it needs to access. For services that startup under a specified user account, users must always get a TGT first, then get Service Tickets to all computers and services accessed.

Solution

Configure the policy value in the Default Domain Policy for Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies -> Kerberos Policy -> 'Maximum lifetime for user ticket' to a maximum of 10 hours, but not 0, which equates to 'Ticket doesn't expire'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-226067r794794_rule, STIG-ID|WN12-AC-000012-DC, STIG-Legacy|SV-51164, STIG-Legacy|V-2378, Vuln-ID|V-226067

Plugin: Windows

Control ID: df03e9b5b218d03174e1f23a4e37a851873a34a5ceefa5a84958c13a612aea57