CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
Remediation:
To establish the recommended configuration via GP, set the following UI path to Negotiate signing (configuring to Require signing also conforms to the benchmark):
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\Network security: LDAP client signing requirements
Impact:
None - this is the default behavior. However, if you choose instead to configure the server to require LDAP signatures then you must also configure the client. If you do not configure the client it will not be able to communicate with the server, which could cause many features to fail, including user authentication, Group Policy, and logon scripts, because the caller will be told that the LDAP BIND command request failed.
Default Value:
Negotiate signing. (If Transport Layer Security/Secure Sockets Layer (TLS/SSL) has not been started, the LDAP BIND request is initiated with the LDAP data signing option set in addition to the caller-specified options. If TLS/SSL has been started, the LDAP BIND request is initiated with the caller-specified options.)
References:
1. CCE-33802-0
CIS Controls:
Version 6
13 Data Protection Data Protection
Version 7
5.1 Establish Secure Configurations Maintain documented, standard security configuration standards for all authorized operating systems and software.
267 | P a g e
Made with FlippingBook - Online magazine maker