Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-243452 | WPAW-00-001100 | SV-243452r722927_rule | Medium |
Description |
---|
A main security architectural construct of a PAW is to limit users of the PAW to only administrators of high-value IT resources. This will mitigate some of the risk of attack on administrators of high-value IT resources. |
STIG | Date |
---|---|
Microsoft Windows PAW Security Technical Implementation Guide | 2023-08-21 |
Check Text ( C-46727r722925_chk ) |
---|
Verify the effective setting in Local Group Policy Editor. Run "gpedit.msc". Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment. If any groups or accounts other than the following are granted the "Allow log on locally" user right, this is a finding: - Administrators - Groups specifically designated to manage high-value IT resources |
Fix Text (F-46684r722926_fix) |
---|
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on locally" to only include the following groups or accounts: - Administrators - Groups specifically designated to manage high-value IT resources |