UCF STIG Viewer Logo

The operating system must not allow an unattended or automatic logon to the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-203782 SRG-OS-000480-GPOS-00229 SV-203782r388482_rule Medium
Description
Failure to restrict system access to authenticated users negatively impacts operating system security.
STIG Date
General Purpose Operating System Security Requirements Guide 2022-06-06

Details

Check Text ( C-3907r375737_chk )
If the operating system provides a public access service, such as a kiosk, this is not applicable. Verify the operating system does not allow an unattended or automatic logon to the system. If it does, this is a finding. Automatic logon as an authorized user allows access to any user with physical access to the operating system.
Fix Text (F-3907r375738_fix)
If the operating system provides a public access service, such as a kiosk, this is not applicable. Configure the operating system to not allow an unattended or automatic logon to the system. Automatic logon as an authorized user allows access to any user with physical access to the operating system.