Microsoft Windows 10

Caching of logon credentials must be limited

STIG ID: WN10-SO-000085 |   SRG: SRG-OS-000480-GPOS-00227 |   Severity: Low |   CCI: CCI-000366 |   Vulnerability ID: V-220923

Description

The default Windows configuration caches the last logon credentials for users who log on interactively to a system. This feature is provided for system availability reasons, such as the user's machine being disconnected from the network or domain controllers being unavailable. Even though the credential cache is well-protected, if a system is attacked, an unauthorized individual may isolate the password to a domain user account using a password-cracking program and gain access to the domain.

Check

C-22638r555254_chk

This is the default configuration for this setting (10 logons to cache).If the following registry value does not exist or is not configured as specified, this is a finding:Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Value Name: CachedLogonsCountValue Type: REG_SZValue: 10 (or less)This setting only applies to domain-joined systems, however, it is configured by default on all systems.

Fix

F-22627r555255_fix

This is the default configuration for this setting (10 logons to cache).Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Interactive logon: Number of previous logons to cache (in case domain controller is not available)" to "10" logons or less.This setting only applies to domain-joined systems, however, it is configured by default on all systems.