Raw File
SV-88353.md
---
scapolite:
    class: rule
    version: '0.51'
id: SV-88353
id_namespace: mil.disa.Windows-Server-2016-STIG
title: Windows Server 2016 must be configured to force users to log off when their
    allowed logon hours expire.
rule: <see below>
description: <see below>
applicability:
  - system: org.scapolite.xccdf.applicability
    weight: 10.0
    selected: false
    role: ''
    severity: medium
implementations:
  - relative_id: F-80139r1
    description: <see below>
    automations:
      - system: org.scapolite.implementation.win_gpo
        ui_path: 'Computer Configuration\Policies\Windows Settings\Security Settings\Local
            Policies\Security Options\Network security: Force logoff when logon hours
            expire'
        value: Enabled
        verification_status: Checked.
      - system: org.scapolite.implementation.win_secedit
        setting_name: MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\EnableForcedLogOff
        section: Registry Values
        value: 1
        type_value: 4
checks:
  - relative_id: C-73771r1
    description: <see below>
  - relative_id: '01'
    title: OVAL-based check
    description: <see below>
    automations:
      - system: http://oval.mitre.org/XMLSchema/oval-definitions-5
        idref: oval:mil.disa.stig.windows:def:1216
        href: U_MS_Windows_Server_2016_V1R7_STIG_SCAP_1-2_Benchmark-oval.xml
crossrefs:
  - system: http://iase.disa.mil/cci
    idref: CCI-001133
    relation: ''
  - system: http://cce.mitre.org
    idref: CCE-46389-3
    relation: ''
history:
  - version: r1
    action: created
    description: WN16-SO-000370
    internal_comment: ''
---


## /rule

Windows Server 2016 must be configured to force users to log off when their allowed logon hours expire.

## /description

[**VulnDiscussion**]{.separator type='STIG'}

Limiting logon hours can help protect data by allowing access only during specified times. This setting controls whether users are forced to log off when their allowed logon hours expire. If logon hours are set for users, this must be enforced.

[**Documentable**]{.separator type='STIG'}

false

## /implementations/0/description

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Network security: Force logoff when logon hours expire" to "Enabled".

## /checks/0/description

Verify the effective setting in Local Group Policy Editor.

Run "gpedit.msc".

Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options.

If the value for "Network security: Force logoff when logon hours expire" is not set to "Enabled", this is a finding.

## /checks/1/description

IASE supplies an OVAL check.
back to top