WN10-00-000250 - Windows 10 non-persistent VM sessions should not exceed 24 hours.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

For virtual desktop implementations (VDIs) where the virtual desktop instance is deleted or refreshed upon logoff, the organization should enforce that sessions be terminated within 24 hours. This would ensure any data stored on the VM that is not encrypted or covered by Credential Guard is deleted.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Set non-persistent VM sessions to not exceed 24 hours.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_10_V2R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001199, Rule-ID|SV-220738r569187_rule, STIG-ID|WN10-00-000250, STIG-Legacy|SV-111557, STIG-Legacy|V-102611, Vuln-ID|V-220738

Plugin: Windows

Control ID: b78c11f22085caf639e24335c5fe239816dd8f17d8c07147ca249d425b4043b4