WPAW-00-001100 - Windows PAWs must be restricted to only allow groups used to manage high-value IT resources and members of the local Administrators group to log on locally.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A main security architectural construct of a PAW is to limit users of the PAW to only administrators of high-value IT resources. This will mitigate some of the risk of attack on administrators of high-value IT resources.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> 'Allow log on locally' to only include the following groups or accounts:

- Administrators
- Groups specifically designated to manage high-value IT resources

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_PAW_V2R3_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-243452r722927_rule, STIG-ID|WPAW-00-001100, STIG-Legacy|SV-92871, STIG-Legacy|V-78165, Vuln-ID|V-243452

Plugin: Windows

Control ID: 1f4008df890626bca1f04381a17235c43864f7867fa44ea31b547c4e84c723c5