Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-26503 | WN08-UR-000039 | SV-48512r2_rule | ECLP-1 | Medium |
Description |
---|
Inappropriate granting of user rights can provide system, administrative, and other high level capabilities. The "Replace a process level token" user right allows one process or service to start another process or service with a different security access token. A user with this right could use this to impersonate another account. |
STIG | Date |
---|---|
Windows 8 / 8.1 Security Technical Implementation Guide | 2015-11-30 |
Check Text ( C-45163r1_chk ) |
---|
Analyze the system using the Security Configuration and Analysis snap-in. (See "Performing Analysis with the Security Configuration and Analysis Snap-in" in the STIG Overview document.) Expand the Security Configuration and Analysis tree view. Navigate to Local Policies -> User Rights Assignment. If any accounts or groups other than the following are granted the "Replace a process level token" user right, this is a finding: Local Service Network Service |
Fix Text (F-41635r1_fix) |
---|
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> "Replace a process level token" to only include the following accounts or groups: Local Service Network Service |