This policy setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they do not have this user right. Users who can create global objects could affect processes that run under other users' sessions. This capability could lead to a variety of problems, such as application failure or data corruption. The recommended state for this setting is: Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE. Note: A Member Server with Microsoft SQL Server and its optional 'Integration Services' component installed will require a special exception to this recommendation for additional SQL-generated entries to be granted this user right. Rationale: Users who can create global objects could affect Windows services and processes that run under other user or system accounts. This capability could lead to a variety of problems, such as application failure, data corruption and elevation of privilege. Impact: None - this is the default behavior.
Solution
To establish the recommended configuration via GP, set the following UI path to Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create global objects Default Value: Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE. Additional Information: This Benchmark Recommendation maps to: Microsoft Windows Server 2016 Security Technical Implementation Guide: Version 1, Release 13, Benchmark Date: May 15, 2020 Vul ID: V-73749 Rule ID: SV-88413r2_rule STIG ID: WN16-UR-000100 Severity: CAT II