WPAW-00-001100 - Windows PAWs must be restricted to only allow groups used to manage high-value IT resources and members of the local Administrators group to log on locally.

Information

A main security architectural construct of a PAW is to limit users of the PAW to only administrators of high-value IT resources. This will mitigate some of the risk of attack on administrators of high-value IT resources.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> 'Allow log on locally' to only include the following groups or accounts:

- Administrators
- Groups specifically designated to manage high-value IT resources

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_PAW_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-243452r991589_rule, STIG-ID|WPAW-00-001100, STIG-Legacy|SV-92871, STIG-Legacy|V-78165, Vuln-ID|V-243452

Plugin: Windows

Control ID: b10fa74e56629c8775d91b4c9433363281ea6ddc78c8e34480cd9822c0a4f259