Hello all thanks for looking,
I am standing up a secure environment. I have 4 (Virtual) Win 2008 64 bit servers and multiple (physical) win 7 pro 32 bit clients. I originally stood everything up and installed all software on all systems. I was able to remote desktop from any machine to any machine with no issues. I started to lock the systems down via GPO I know this has to do with GPO because I have rolled back machines and am able to tell exactly where the issue began. Unfortunately I cannot pin point exactly what value is my culprit. When I disable the GPO the problem persists. I can only RDP in when I disable the GPO and sys restore the physical machine, then as soon as I re enable the GPO I get " Access is Denied " on a blue windows login screen with nthe OS displayed. Error logs on both machines give no hints the only event logged is on the destination machine under application logs / microsoft / windows / TerminalServicesRemoteConnectionManager this
Listener RDP-tcp recieved a connection
then
Remote Desktop Services : User authentication Succeeded:
User : USERX
Domain: DOMAINX
Source Network Address : my.net.add.x
then
Terminal Server role is not installed
then
The Remote Connection Manager selected Kernel mode RDP protocol Stack
then
Listener RDP-Tcp has started listening
Over and over. This is a Win 7 pro to win 7 pro attempt- its the same from any source to any destination. The user name I am using is an Admin, Domain admin, local admin, remote desktop user and overall every role possible. There are alot of permissions re-assignments etc but I am sure this is due to the policy
here is a policy printout
Security Settings
Account Policies/Password Policy
Policy Setting
Enforce password history 24 passwords remembered
Maximum password age 42 days
Minimum password age 1 days
Minimum password length 14 characters
Password must meet complexity requirements Enabled
Store passwords using reversible encryption Disabled
Account Policies/Account Lockout Policy
Policy Setting
Account lockout duration 0 minutes
Account lockout threshold 3 invalid logon attempts
Reset account lockout counter after 60 minutes
Account Policies/Kerberos Policy
Policy Setting
Enforce user logon restrictions Enabled
Maximum lifetime for service ticket 600 minutes
Maximum lifetime for user ticket 10 hours
Maximum lifetime for user ticket renewal 7 days
Maximum tolerance for computer clock synchronization 5 minutes
Local Policies/Audit Policy
Policy Setting
Audit account logon events Success, Failure
Audit logon events Success, Failure
Audit object access No auditing
Audit policy change Success, Failure
Audit privilege use Failure
Audit process tracking No auditing
Audit system events No auditing
Local Policies/User Rights Assignment
Policy Setting
Access Credential Manager as a trusted caller
Access this computer from the network NT AUTHORITY\Authenticated Users, BUILTIN\Administrators
Act as part of the operating system
Add workstations to domain BUILTIN\Administrators
Adjust memory quotas for a process NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators
Allow log on locally Domain Admins, BUILTIN\Administrators
Allow log on through Terminal Services BUILTIN\Administrators
Back up files and directories BUILTIN\Administrators
Bypass traverse checking NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\Authenticated Users, BUILTIN\Administrators
Change the system time NT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators
Change the time zone NT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators
Create a pagefile BUILTIN\Administrators
Create a token object
Create global objects NT AUTHORITY\SERVICE, NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators
Create permanent shared objects
Create symbolic links BUILTIN\Administrators
Debug programs
Deny access to this computer from the network BUILTIN\Guests
Deny log on as a batch job BUILTIN\Guests
Deny log on as a service
Deny log on locally BUILTIN\Guests
Deny log on through Terminal Services BUILTIN\Guests
Enable computer and user accounts to be trusted for delegation BUILTIN\Administrators
Force shutdown from a remote system BUILTIN\Administrators
Generate security audits NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE
Impersonate a client after authentication NT AUTHORITY\SERVICE, NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators
Increase a process working set NT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators
Increase scheduling priority BUILTIN\Administrators
Load and unload device drivers BUILTIN\Administrators
Lock pages in memory
Log on as a batch job BUILTIN\Administrators
Manage auditing and security log PMP\Auditor Group
Modify an object label BUILTIN\Administrators
Modify firmware environment values BUILTIN\Administrators
Perform volume maintenance tasks BUILTIN\Administrators
Profile single process BUILTIN\Administrators
Profile system performance BUILTIN\Administrators
Remove computer from docking station BUILTIN\Administrators
Replace a process level token NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE
Restore files and directories BUILTIN\Administrators
Shut down the system BUILTIN\Administrators
Synchronize directory service data
Take ownership of files or other objects BUILTIN\Administrators
Local Policies/Security Options
Accounts
Policy Setting
Accounts: Administrator account status Enabled
Accounts: Guest account status Disabled
Accounts: Limit local account use of blank passwords to console logon only Enabled
Accounts: Rename administrator account "DELETED"
Accounts: Rename guest account "DELETED"
Audit
Policy Setting
Audit: Audit the access of global system objects Disabled
Audit: Audit the use of Backup and Restore privilege Disabled
Audit: Shut down system immediately if unable to log security audits Disabled
Devices
Policy Setting
Devices: Allow undock without having to log on Disabled
Devices: Allowed to format and eject removable media Administrators
Devices: Prevent users from installing printer drivers Enabled
Devices: Restrict CD-ROM access to locally logged-on user only Disabled
Domain Member
Policy Setting
Domain member: Digitally encrypt or sign secure channel data (always) Enabled
Domain member: Digitally encrypt secure channel data (when possible) Enabled
Domain member: Digitally sign secure channel data (when possible) Enabled
Domain member: Disable machine account password changes Disabled
Domain member: Maximum machine account password age 30 days
Domain member: Require strong (Windows 2000 or later) session key Enabled
DELETED
Interactive logon: Number of previous logons to cache (in case domain controller is not available) 1 logons
Interactive logon: Prompt user to change password before expiration 14 days
Interactive logon: Require Domain Controller authentication to unlock workstation Disabled
Interactive logon: Require smart card Disabled
Interactive logon: Smart card removal behavior Lock Workstation
Microsoft Network Client
Policy Setting
Microsoft network client: Digitally sign communications (always) Enabled
Microsoft network client: Digitally sign communications (if server agrees) Enabled
Microsoft network client: Send unencrypted password to third-party SMB servers Disabled
Microsoft Network Server
Policy Setting
Microsoft network server: Amount of idle time required before suspending session 15 minutes
Microsoft network server: Digitally sign communications (always) Enabled
Microsoft network server: Digitally sign communications (if client agrees) Enabled
Microsoft network server: Disconnect clients when logon hours expire Enabled
Network Access
Policy Setting
Network access: Allow anonymous SID/Name translation Disabled
Network access: Do not allow anonymous enumeration of SAM accounts Enabled
Network access: Do not allow anonymous enumeration of SAM accounts and shares Enabled
Network access: Do not allow storage of credentials or .NET Passports for network authentication Enabled
Network access: Let Everyone permissions apply to anonymous users Disabled
DELETED
Network Security
Policy Setting
Network security: Do not store LAN Manager hash value on next password change Enabled
Network security: Force logoff when logon hours expire Disabled
Network security: LAN Manager authentication level Send NTLMv2 response only. Refuse LM & NTLM
Network security: LDAP client signing requirements Negotiate signing
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Enabled
Require NTLMv2 session security Enabled
Require 128-bit encryption Enabled
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Enabled
Require NTLMv2 session security Enabled
Require 128-bit encryption Enabled
Recovery Console
Policy Setting
Recovery console: Allow automatic administrative logon Disabled
Recovery console: Allow floppy copy and access to all drives and all folders Disabled
Shutdown
Policy Setting
Shutdown: Allow system to be shut down without having to log on Disabled
Shutdown: Clear virtual memory pagefile Disabled
System Cryptography
Policy Setting
System cryptography: Force strong key protection for user keys stored on the computer User must enter a password each time they use a key
System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing Disabled
System Objects
Policy Setting
System objects: Require case insensitivity for non-Windows subsystems Enabled
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enabled
System Settings
Policy Setting
System settings: Optional subsystems
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies Enabled
User Account Control
Policy Setting
User Account Control: Admin Approval Mode for the Built-in Administrator account Enabled
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Prompt for credentials
User Account Control: Behavior of the elevation prompt for standard users Automatically deny elevation requests
User Account Control: Detect application installations and prompt for elevation Enabled
User Account Control: Only elevate executables that are signed and validated Disabled
User Account Control: Run all administrators in Admin Approval Mode Enabled
User Account Control: Switch to the secure desktop when prompting for elevation Enabled
User Account Control: Virtualize file and registry write failures to per-user locations Enabled
Other
Policy Setting
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings Enabled
MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) Highest protection, source routing is completely disabled
MSS: (NtfsDisable8dot3NameCreation) Enable the computer to stop generating 8.3 style filenames (recommended) Enabled
MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) Enabled
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Disabled
User Account Control: Only elevate UIAccess applications that are installed in secure locations Enabled
Event Log
Policy Setting
Maximum application log size 16384 kilobytes
Maximum security log size 1000064 kilobytes
Maximum system log size 16384 kilobytes
Prevent local guests group from accessing application log Enabled
Prevent local guests group from accessing security log Enabled
Prevent local guests group from accessing system log Enabled
Retention method for application log As needed
Retention method for security log Manually
Retention method for system log As needed
Restricted Groups
Group Members Member of
BUILTIN\Remote Desktop Users Administrators
DELETED
Firewall is disabled completely and I have undid every setting having to do with encryption and RDP I can find. I have picked through the registry and restored keys with default keys. This Domain will have no internet or outside connection what so ever. I cannot get RDP to work.