Microsoft Windows Server 2019

Windows Server 2019 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares

STIG ID: WN19-CC-000080 | SRG: SRG-OS-000480-GPOS-00227 | Severity: Medium | CCI: CCI-000366 | Vulnerability ID: V-205862

Description

Additional security requirements are applied to UNC paths specified in hardened UNC paths before allowing access to them. This aids in preventing tampering with or spoofing of connections to these paths.

Check

C-6127r857310_chk

This requirement is applicable to domain-joined systems. For standalone or nondomain-joined systems, this is NA.If the following registry values do not exist or are not configured as specified, this is a finding:Registry Hive: HKEY_LOCAL_MACHINERegistry Path: \SOFTWARE\Policies\Microsoft\Windows\NetworkProvider\HardenedPaths\Value Name: \\*\NETLOGONValue Type: REG_SZValue: RequireMutualAuthentication=1, RequireIntegrity=1Value Name: \\*\SYSVOLValue Type: REG_SZValue: RequireMutualAuthentication=1, RequireIntegrity=1Additional entries would not be a finding.

Fix

F-6127r355949_fix

Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Network Provider >> "Hardened UNC Paths" to "Enabled" with at least the following configured in "Hardened UNC Paths" (click the "Show" button to display):Value Name: \\*\SYSVOLValue: RequireMutualAuthentication=1, RequireIntegrity=1Value Name: \\*\NETLOGONValue: RequireMutualAuthentication=1, RequireIntegrity=1