2.2.29 Ensure 'Deny log on locally' to include 'Guests, members of Enterprise Admins group and members of Domain Admins group'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This security setting determines which users are prevented from logging on at the computer. This policy setting supersedes the Allow log on locally policy setting if an account is subject to both policies.

The STIG recommended state for this setting is to include: Guests, members of Enterprise Admins group and members of Domain Admins group.

Important: If you apply this security policy to the Everyone group, no one will be able to log on locally.

Important #2: The Microsoft Windows Server 2016 Security Technical Implementation Guide (STIG) denies Enterprise Admins and Domain Admins from logging on locally. This will cause Administrators with these privileges not to be able to log on locally.

Rationale:

Any account with the ability to log on locally could be used to log on at the console of the computer. If this user right is not restricted to legitimate users who need to log on to the console of the computer, unauthorized users might download and run malicious software that elevates their privileges.

Impact:

If you assign the Deny log on locally user right to additional accounts, you could limit the abilities of users who are assigned to specific roles in your environment. However, this user right should explicitly be assigned to the ASPNET account on computers that run IIS 6.0. You should confirm that delegated activities will not be adversely affected.

Solution

To establish the recommended configuration via GP, set the following UI path to include: Guests, members of Enterprise Admins group and members of Domain Admins group

Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on locally

Default Value:

No One (blank).

Additional Information:

This Benchmark Recommendation maps to:

Microsoft Windows Server 2016 Security Technical Implementation Guide:
Version 1, Release 13, Benchmark Date: May 15, 2020

Vul ID: V-73771
Rule ID: SV-88435r3_rule
STIG ID: WN16-MS-000400
Severity: CAT II

Note: This recommendation is intended for Domain Controllers only. The setting for Member Servers, according to the STIG, is located in the L3 Member Server profile.

See Also

https://workbench.cisecurity.org/files/2940