UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Unapproved Users have access to Debug programs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18010 4.005 SV-29589r1_rule High
Description
This is a Category 1 finding as it provides access to the kernel with complete access to sensitive and critical operating system components.
STIG Date
Windows 2008 Member Server Security Technical Implementation Guide 2019-04-01

Details

Check Text ( C-20665r1_chk )
Analyze the system using the Security Configuration and Analysis snap-in.
Expand the Security Configuration and Analysis tree view.
Navigate to Local Policies -> User Rights Assignment.

If any user accounts, or groups, (to include administrators) are granted the “Debug programs” right, then this is a finding.

If Administrators require this right for troubleshooting or application issues, it should be assigned on a
temporary basis as needed.

Documentable Explanation: Some applications may require this right to function such as the Windows 2003 Cluster service account. Any exception needs to be documented with the IAO. Acceptable forms of documentation include vendor published documents and application owner confirmation.
Fix Text (F-18585r1_fix)
Configure the system to remove any accounts from the "Debug programs" user right.