Skip to content

VMware Horizon 7.13 Connection Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Horizon Connection Server must reauthenticate users after a network interruption.

    Given the remote access nature of Horizon Connection Server, the client must be ensured to be under positive control as much as is possible from the server side. As such, whenever a network interru...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must disconnect users after a maximum of ten hours.

    Horizon Connection Server is intended to provide remote desktops and applications, generally during working hours and for no more than an extended workday. Leaving sessions active for more than wha...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must disconnect applications after two hours of idle time.

    Horizon View is intended to provide remote desktops and applications during for more or less continuous use. If an application is open and goes used for more than two hours, that application must b...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • SRG-APP-000516-AS-000237

    Group
  • SRG-APP-000516-AS-000237

    Group
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must backup its configuration daily.

    Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baselin...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server Instant Clone domain account must be configured with limited permissions.

    Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baselin...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    Configuring the application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baselin...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must have X-Frame-Options enabled.

    RFC 7034 HTTP Header Field X-Frame-Options, also known as counter clickjacking, is enabled by default on the Horizon Connection Server. It can be disabled by adding the entry "x-frame-options=OFF" ...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group
  • SRG-APP-000516-AS-000237

    Group
  • The Horizon Connection Server must enable the Content Security Policy.

    The Horizon Connection Server Content Security Policy (CSP) feature mitigates a broad class of content injection vulnerabilities, such as cross-site scripting (XSS), clickjacking and other code inj...
    Rule Medium Severity
  • SRG-APP-000516-AS-000237

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules