WN12-GE-000008 - Permissions for Windows installation directory must conform to minimum requirements.

Information

Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the operating system and installed applications.

The default permissions are adequate when the Security Option 'Network access: Let everyone permissions apply to anonymous users' is set to 'Disabled' (V-3377).

Solution

Maintain the default file ACLs and configure the Security Option: 'Network access: Let everyone permissions apply to anonymous users' to 'Disabled' (V-3377).

Default Permissions:
Type - 'Allow' for all
Inherited from - 'None' for all

Principal - Access - Applies to

TrustedInstaller - Full control - This folder and subfolders
SYSTEM - Modify - This folder only
SYSTEM - Full control - Subfolders and files only
Administrators - Modify - This folder only
Administrators - Full control - Subfolders and files only
Users - Read & execute - This folder, subfolders and files
CREATOR OWNER - Full control - Subfolders and files only
ALL APPLICATION PACKAGES - Read & execute - This folder, subfolders and files

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_MS_V3R7_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-3(4), 800-53|CM-5(6), CAT|II, CCI|CCI-001499, CCI|CCI-002165, Rule-ID|SV-225422r852236_rule, STIG-ID|WN12-GE-000008, STIG-Legacy|SV-52137, STIG-Legacy|V-40179, Vuln-ID|V-225422

Plugin: Windows

Control ID: d1cdbdfbb1e260c1417fa13e420583624638a5f02948441334a2beac275856a2