CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as prescribed. This group policy setting is backed by the following registry location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\pku2u:AllowOnlineID
Remediation:
To establish the recommended configuration via GP, set the following UI path to Disabled :
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network Security: Allow PKU2U authentication requests to this computer to use online identities
Impact:
None - this is the default configuration for domain-joined computers.
Default Value:
Disabled. (Online identities will not to be allowed to authenticate to a domain-joined machine.)
References:
1. CCE-35411-8
CIS Controls:
Version 6
16.9 Configure Account Access Centrally Configure access for all accounts through a centralized point of authentication, for example Active Directory or LDAP. Configure network and security devices for centralized authentication as well.
Version 7
16.2 Configure Centralized Point of Authentication Configure access for all accounts through as few centralized points of authentication as possible, including network, security, and cloud systems.
256 | P a g e
Made with FlippingBook - Online magazine maker