2.3.17.4 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop or Prompt for credentials on the secure desktop' (STIG only)

Information

This policy setting controls the behavior of the elevation prompt for administrators.

The recommended STIG state for this setting is: Prompt for consent on the secure desktop or Prompt for credentials on the secure desktop

Note: The CIS recommended state for this setting is: Prompt for consent on the secure desktop which differs from the STIG recommended state.

One of the risks that the UAC feature introduced with Windows Vista is trying to mitigate is that of malicious software running under elevated credentials without the user or administrator being aware of its activity. This setting raises awareness to the administrator of elevated privilege operations and permits the administrator to prevent a malicious program from elevating its privilege when the program attempts to do so.

Solution

To establish the recommended configuration via GP, set the following UI path to Prompt for consent on the secure desktop or Prompt for credentials on the secure desktop :

Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode

Impact:

When an operation (including execution of a Windows binary) requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.

See Also

https://workbench.cisecurity.org/benchmarks/15301