UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Replace a process level token user right must only be assigned to Local Service and Network Service.


Overview

Finding ID Version Rule ID IA Controls Severity
V-63937 WN10-UR-000155 SV-78427r1_rule Medium
Description
Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. The "Replace a process level token" user right allows one process or service to start another process or service with a different security access token. A user with this right could use this to impersonate another account.
STIG Date
Windows 10 Security Technical Implementation Guide 2015-11-30

Details

Check Text ( C-64687r1_chk )
Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".

Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment.

If any groups or accounts other than the following are granted the "Replace a process level token" user right, this is a finding:

LOCAL SERVICE
NETWORK SERVICE
Fix Text (F-69865r1_fix)
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Replace a process level token" to only include the following groups or accounts:

LOCAL SERVICE
NETWORK SERVICE