Check: WN08-UR-000005
Windows 8/8.1 STIG:
WN08-UR-000005
(in versions v1 r23 through v1 r16)
Title
Unauthorized accounts must not have the Allow log on locally user right. (Cat II impact)
Discussion
Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. Accounts with the "Allow log on locally" user right can log on interactively to a system.
Check Content
Analyze the system using the Security Configuration and Analysis snap-in. (See "Performing Analysis with the Security Configuration and Analysis Snap-in" in the STIG Overview document.) Expand the Security Configuration and Analysis tree view. Navigate to Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Allow log on locally" user right, this is a finding: Administrators Users Systems dedicated to managing Active Directory (AD admin platforms), must only allow Administrators, removing the Users group.
Fix Text
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Allow log on locally" to only include the following accounts or groups: Administrators Users Systems dedicated to managing Active Directory (AD admin platforms), must only allow Administrators, removing the Users group.
Additional Identifiers
Rule ID: SV-48521r3_rule
Vulnerability ID: V-26472
Group Title: Allow log on locally
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000213 |
Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. |
Controls
Number | Title |
---|---|
AC-3 |
Access Enforcement |