2.3.17.4 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set

Information

2.3.17.4 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'

This policy setting controls the behavior of the elevation prompt for standard users.

The recommended state for this setting is: 'Automatically deny elevation requests'.

Rationale:

One of the risks that the User Account Control feature introduced with Windows Vista is trying to mitigate is that of malicious programs running under elevated credentials without the user or administrator being aware of their activity.

This setting raises awareness to the user that a program requires the use of elevated privilege operations and requires that the user be able to supply administrative credentials in order for the program to run.

Solution

To establish the recommended configuration via GP, set the following UI path to 'Automatically deny elevation requests:'

Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for standard users

Impact:

When an operation requires elevation of privilege, a configurable access denied error message is displayed.

An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.

Note: With this setting configured as recommended, the default error message displayed when a user attempts to perform an operation or run a program requiring privilege elevation (without Administrator rights) is '_This program will not run.

This program is blocked by group policy.

For more information, contact your system administrator._' Some users who are not used to seeing this message may believe that the operation or program they attempted is specifically blocked by group policy, as that is what the message seems to imply.

This message may therefore result in user questions as to why that specific operation/program is blocked, when in fact, the problem is that they need to perform the operation or run the program with an Administrative account (or 'Run as Administrator' if it _is_ already an Administrator account), and they are not doing that.

See Also

https://workbench.cisecurity.org/files/1933

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10), CCE|CCE-33785-7, CSCv6|5.1

Plugin: Windows

Control ID: 0d54eecf62948523e260ddf5cdbf0d60b414f7d178e295f062d76d315199e73b