WN12-SO-000081 - Windows must elevate all applications in User Account Control, not just signed ones.

Information

User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures whether Windows elevates all applications, or only signed ones.

Solution

UAC requirements are NA on Server Core installations.

Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'User Account Control: Only elevate executables that are signed and validated' to 'Disabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_MS_V3R7_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-3, CAT|II, CCI|CCI-001084, Rule-ID|SV-225519r569185_rule, STIG-ID|WN12-SO-000081, STIG-Legacy|SV-53142, STIG-Legacy|V-16008, Vuln-ID|V-225519

Plugin: Windows

Control ID: b480a1cf16ea65669624e9d0bf6a4684a8cafe0c8be696b9dcdc1c416806a2e9