1.1.1.2.3.12 Set 'Shut down the system' to 'Administrators'

Information

This policy setting determines which users who are logged on locally to the computers in your environment can shut down the operating system with the Shut Down command. Misuse of this user right can result in a denial of service condition. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. The ability to shut down domain controllers should be limited to a very small number of trusted administrators. Although the Shut down the system user right requires the ability to log on to the server, you should be very careful about which accounts and groups you allow to shut down a domain controller. When a domain controller is shut down, it is no longer available to process logons, serve Group Policy, and answer Lightweight Directory Access Protocol (LDAP) queries. If you shut down domain controllers that possess Flexible SingleMaster Operations (FSMO) roles, you can disable key domain functionality, such as processing logons for new passwords the Primary Domain Controller (PDC) Emulator role.

Solution

To implement the recommended configuration state, set the following Group Policy setting to Administrators.

Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Shut down the system

Impact- The impact of removing these default groups from the Shut down the system user right could limit the delegated abilities of assigned roles in your environment. You should confirm that delegated activities will not be adversely affected.

See Also

https://workbench.cisecurity.org/files/42

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(7), CCE|CCE-3346-4

Plugin: Windows

Control ID: 3aaf62056508939ca7a67be18e0ba47d74b58eacc7b201a3fd1df314b0f35a43