4332cad0-613a-47fb-ba71-a0ad576651b5
A computer connecting to a domain controller will establish a secure channel. The secure channel connection may be subject to compromise, such as hijacking or eavesdropping, if strong session keys are not used to establish the connection. Requiring strong session keys enforces 128-bit encryption between systems.
Satisfies: SRG-OS-000423-GPOS-00187, SRG-OS-000424-GPOS-00188
To fix this configure the policy value for
Computer Configuration
|_ Windows Settings
|_ Security Settings
|_ Local Policies
|_ Security Options
|_ Domain member: Require strong (Windows 2000 or Later) session key to "Enabled".
STIG: Server
2022: https://system32.eventsentry.com/stig/viewer/V-254455
2019: https://system32.eventsentry.com/stig/viewer/V-205824
2016: https://system32.eventsentry.com/stig/viewer/V-225034
Desktop
W11: https://system32.eventsentry.com/stig/viewer/V-253443
W10: https://system32.eventsentry.com/stig/viewer/V-220919
NIST 800-53 : CM-6, SC-8, SC-28, IA-3
NIST 800-171: 3.4.6, 3.13.8
CMMC v2.0 L2: CM.L2-3.4.6, SC.L2-3.13.8
PCI-DSS v4.0: 2.2.1, 4.2.1
HIPAA SR : §164.312(e)(1), §164.312(e)(2)(ii)
HIPAA HICP : Practice 6 (Network Management)
Manage your cookie preferences below:
To learn more about our use of cookies, please see our
Privacy Policy.