WN19-UR-000200 - Windows Server 2019 Profile single process user right must only be assigned to the Administrators group.

Information

Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities.

Accounts with the 'Profile single process' user right can monitor non-system processes performance. An attacker could use this to identify processes to attack.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> 'Profile single process' to include only the following accounts or groups:

- Administrators

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V3R2_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10), CAT|II, CCI|CCI-002235, Rule-ID|SV-205766r958726_rule, STIG-ID|WN19-UR-000200, STIG-Legacy|SV-103171, STIG-Legacy|V-93083, Vuln-ID|V-205766

Plugin: Windows

Control ID: 0dc024e6a191a664645ac46a37f2fa4dc08d5ac63afec6c27bb7bbc896bb1374