Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-220969 | WN10-UR-000075 | SV-220969r857200_rule | Medium |
Description |
---|
Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" right defines accounts that are prevented from logging on to the system as a batch job, such as Task Scheduler. In an Active Directory Domain, denying logons to the Enterprise Admins and Domain Admins groups on lower-trust systems helps mitigate the risk of privilege escalation from credential theft attacks that could lead to the compromise of an entire domain. |
STIG | Date |
---|---|
Microsoft Windows 10 Security Technical Implementation Guide | 2022-08-29 |
Check Text ( C-22684r857198_chk ) |
---|
This requirement is applicable to domain-joined systems. For standalone or nondomain-joined systems, this is NA. Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment. If the following groups or accounts are not defined for the "Deny log on as a batch job" right, this is a finding. Domain Systems Only: Enterprise Admin Group Domain Admin Group |
Fix Text (F-22673r857199_fix) |
---|
This requirement is applicable to domain-joined systems. For standalone or nondomain-joined systems, this is NA. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following: Domain Systems Only: Enterprise Admin Group Domain Admin Group |