CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
5.39 (L2) Ensure 'Windows Remote Management (WS-Management) (WinRM)' is set to 'Disabled' (Scored)
ProfileApplicability:
Level 2 (L2) - High Security/Sensitive Data Environment (limited functionality)
Description:
Windows Remote Management (WinRM) service implements the WS-Management protocol for remote management. WS-Management is a standard web services protocol used for remote software and hardware management. The WinRM service listens on the network for WS-Management requests and processes them.
The recommended state for this setting is: Disabled .
Rationale:
Features that enable inbound network connections increase the attack surface. In a high security environment, management of secure workstations should be handled locally.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as prescribed. This group policy setting is backed by the following registry location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM:Start
Remediation:
To establish the recommended configuration via GP, set the following UI path to: Disabled .
Computer Configuration\Policies\Windows Settings\Security Settings\System Services\Windows Remote Management (WS-Management)
Impact:
The ability to remotely manage the system with WinRM will be lost.
Note: Many remote administration tools, such as System Center Configuration Manager (SCCM), may require the WinRM service to be operational for remote management.
372 | P a g e
Made with FlippingBook - Online magazine maker