WPAW-00-001100 - Windows PAWs must be restricted to only allow groups used to manage high-value IT resources and members of the local Administrators group to log on locally.

Information

A main security architectural construct of a PAW is to limit users of the PAW to only administrators of high-value IT resources. This will mitigate some of the risk of attack on administrators of high-value IT resources.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> 'Allow log on locally' to only include the following groups or accounts:

- Administrators
- Groups specifically designated to manage high-value IT resources

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_PAW_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(7), CAT|II, CCI|CCI-000366, CSCv6|16, Rule-ID|SV-243452r722927_rule, STIG-ID|WPAW-00-001100, STIG-Legacy|SV-92871, STIG-Legacy|V-78165, Vuln-ID|V-243452

Plugin: Windows

Control ID: 866c64c0ae8724b6a7507dac8466e2c090b810e90a56f1dc15b78af24a981539