1. Home
  2. Security Hardening
  3. CIS Windows Server 2012 R2 MS L2 V2.5.0
  4. Ensure ‘Enable Windows NTP Server’ is set to ‘Disabled’ (MS only)

Ensure ‘Enable Windows NTP Server’ is set to ‘Disabled’ (MS only)

Details

This policy setting allows you to specify whether the Windows NTP Server is enabled.

The recommended state for this setting is: Disabled.

Note: In most enterprise managed environments, you should not disable the Windows NTP Server on Domain Controllers, as it is very important for the operation of NT5DS (domain hierarchy-based) time synchronization.

Rationale:

The configuration of proper time synchronization is critically important in an enterprise managed environment both due to the sensitivity of Kerberos authentication timestamps and also to ensure accurate security logging.

Impact:

None – this is the default behavior.

Solution

To establish the recommended configuration via GP, set the following UI path to Disabled:

Computer ConfigurationPoliciesAdministrative TemplatesSystemWindows Time ServiceTime ProvidersEnable Windows NTP Server

Note: This Group Policy path is provided by the Group Policy template W32Time.admx/adml that is included with all versions of the Microsoft Windows Administrative Templates.

Default Value:

Disabled. (The computer cannot service NTP requests from other computers.)

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles