3.136 - User Account Control - Non UAC compliant applications run in virtualized file and registry entries.

Information

This check verifies that non UAC compliant applications will run in virtualized file and registry entries in per user locations allowing them to run.

Solution

Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'User Account Control: Virtualize file and registry write failures to per-user locations' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_7_V1R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-29(1), CAT|II, CCI|CCI-001084, Rule-ID|SV-25124r1_rule, STIG-ID|3.136, Vuln-ID|V-14242

Plugin: Windows

Control ID: 78f1e21414bbf72b29930426429df73dbf910b14b36941293afbf3d98c1e1356