WN19-DC-000030 - Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This setting determines the maximum amount of time (in minutes) that a granted session ticket can be used to access a particular service. Session tickets are used only to authenticate new connections with servers. Ongoing operations are not interrupted if the session ticket used to authenticate the connection expires during the connection.

Satisfies: SRG-OS-000112-GPOS-00057, SRG-OS-000113-GPOS-00058

Solution

Configure the policy value in the Default Domain Policy for Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Account Policies >> Kerberos Policy >> 'Maximum lifetime for service ticket' to a maximum of '600' minutes, but not '0', which equates to 'Ticket doesn't expire'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V2R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001941, CCI|CCI-001942, Rule-ID|SV-205703r569188_rule, STIG-ID|WN19-DC-000030, STIG-Legacy|SV-103531, STIG-Legacy|V-93445, Vuln-ID|V-205703

Plugin: Windows

Control ID: 4de8ee809a73ddcefbb2ecf8490fc631ca4dc92151843aee15c53362a31fa026