UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Standard user accounts must only have Read permissions to the Winlogon registry key.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26070 WN08-RG-000001 SV-48504r1_rule ECCD-1 ECCD-2 High
Description
Permissions on the Winlogon registry key must only allow privileged accounts to change registry values. If standard users have this capability, there is a potential for programs to run with elevated privileges when a privileged user logs on to the system.
STIG Date
Windows 8 / 8.1 Security Technical Implementation Guide 2014-04-02

Details

Check Text ( C-45155r1_chk )
Navigate to the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon.

Verify the permissions assigned.

Standard user accounts and groups will only have Read permissions to this registry key. If any standard user accounts or groups have greater permissions, this is a finding. The default permissions satisfy this requirement.
Fix Text (F-41628r1_fix)
Assign only Read permissions for standard user accounts and groups to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon registry key. This is the default configuration.