Check: 3.140
Windows 2008 Domain Controller STIG:
3.140
(in versions v6 r47 through v6 r35)
Title
UAC - Application Elevations (Cat II impact)
Discussion
This check verifies that Windows elevates all applications, not just signed ones.
Check Content
Analyze the system using the Security Configuration and Analysis snap-in. Expand the Security Configuration and Analysis tree view. Navigate to Local Policies -> Security Options. If the value for “User Account Control: Only elevate executables that are signed and validated” is not set to “Disabled”, then this is a finding. The policy referenced configures the following registry value: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \Software\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: ValidateAdminCodeSignatures Value Type: REG_DWORD Value: 0
Fix Text
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “User Account Control: Only elevate executables that are signed and validated” to “Disabled”.
Additional Identifiers
Rule ID: SV-16960r1_rule
Vulnerability ID: V-16008
Group Title: UAC - Application Elevations
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001084 |
Isolate security functions from nonsecurity functions. |
Controls
Number | Title |
---|---|
SC-3 |
Security Function Isolation |