WPAW-00-001100 - Windows PAWs must be restricted to only allow groups used to manage high-value IT resources and members of the local Administrators group to log on locally.

Information

A main security architectural construct of a PAW is to limit users of the PAW to only administrators of high-value IT resources. This will mitigate some of the risk of attack on administrators of high-value IT resources.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> 'Allow log on locally' to only include the following groups or accounts:

- Administrators
- Groups specifically designated to manage high-value IT resources

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_PAW_V1R3_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(7), CAT|II, CCI|CCI-000366, CSCv6|16, Rule-ID|SV-92871r1_rule, STIG-ID|WPAW-00-001100, Vuln-ID|V-78165

Plugin: Windows

Control ID: 3a485807735386bc5446e350c477d907c6caa620d7ec9deac0b4d99174160c40