Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-1103 | 4.010 | SV-18391r1_rule | ECLP-1 | Medium |
Description |
---|
Inappropriate granting of user and advanced user rights can provide system, administrative, and other high level capabilities not required by the normal user. |
STIG | Date |
---|---|
Windows XP Security Technical Implementation Guide | 2012-08-22 |
Check Text ( C-18035r1_chk ) |
---|
Windows XP Analyze the system using the Security Configuration and Analysis snap-in. Expand the Security Configuration and Analysis tree view. Navigate to Local Policies -> User Rights Assignment. Compare the User Rights to the following list, if any unauthorized accounts are given rights that they are not authorized in the chart, then this is a finding. Access this computer from network – Administrators Act as part of the operating system – See separate vulnerability 4.009/V0001102 Adjust memory quotas for a process – Administrators, Local Service, Network Service Allow logon through Terminal Services – (None) Backup files and directories – Administrators Bypass traverse checking – Administrators, Users Change the system time – Administrators Create a pagefile – Administrators Create a token object – (None) Create Global Objects – Administrators, Local Service, Network Service, Service Create permanent shared objects – (None) Debug programs – See separate vulnerability 4.005/V0018010 Deny access to this computer from the network – See separate vulnerability 4.025/V0001155 Deny logon as a batch job – Guests, Support_388945a0 Deny logon as a service – (None) Deny logon locally – Guests, Support_388945a0 Deny logon through Terminal Services – Everyone (Guests if TS is used) Force shutdown from a remote system – Administrators Generate security audits – Local Service, Network Service Impersonate a client after authentication – Administrators, Service Increase scheduling priority – Administrators Load and unload device drivers – Administrators Lock pages in memory – (None) Log on as a batch job – (None) Log on as a service – Local Service, Network Service Log on locally – Administrators, Users Manage auditing and security log – “Auditor’s” Group Modify firmware environment values – Administrators Perform volume maintenance tasks – Administrators Profile single process – Administrators Profile system performance – Administrators Remove computer from docking station – Administrators, Users Replace a process level token – Local Service, Network Service Restore files and directories – Administrators Shut down the system – Administrators, Users Take ownership of files or other objects – Administrators Note: If an account listed has been deleted from the system such as the Support_388945a0 account, the Gold Disk may incorrectly report the account as a finding. If the account does not exist on a system it would not be a finding. Note: The Gold Disk will remediate all User Rights EXCEPT “Manage auditing and security log”. It will report any users/groups with this User Right for review since the site can determine what the “Auditors” group will be named. Documentable Explanation: Some applications require one or more of these rights to function. Any exception needs to be documented with the IAO. Acceptable forms of documentation include vendor published documents and application owner confirmation. |
Fix Text (F-5747r1_fix) |
---|
Configure the system to prevent accounts from having unauthorized User Rights. |