[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-35459-7

Platform: win8.1Date: (C)2015-10-14   (M)2017-10-24



User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. The options are: - Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. - Disabled: Applications that write data to protected locations fail.


Parameter:


Technical Mechanism: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options!User Account Control: Virtualize file and registry write failures to per-user locations (2) REG: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System!EnableVirtualization

References:

Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:22465


OVAL    1
oval:org.secpod.oval:def:22465
XCCDF    6
xccdf_org.secpod_benchmark_ISO27001_Windows_8_1
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_8_1
xccdf_org.secpod_benchmark_general_Windows_8_1
xccdf_org.secpod_benchmark_NIST_800_53_r4_Windows_8_1
...

© 2013 SecPod Technologies