[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

Paid content will be excluded from the download.


Download | Alert*
OVAL

Allow log on locally

ID: oval:org.secpod.oval:def:23022Date: (C)2015-01-07   (M)2018-03-29
Class: COMPLIANCEFamily: windows




This policy setting determines which users can interactively log on to computers in your environment. Logons that are initiated by pressing the CTRL+ALT+DEL key sequence on the client computer keyboard require this user right. Users who attempt to log on through Terminal Services or IIS also require this user right. The Guest account is assigned this user right by default. Although this account is disabled by default, Microsoft recommends that you enable this setting through Group Policy. However, this user right should generally be restricted to the Administrators and Users groups. Assign this user right to the Backup Operators group if your organization requires that they have this capability. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. This policy setting determines which users can interactively log on to computers in your environment. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment!Allow log on locally (2) WMI: root\rsop\computer#RSOP_UserPrivilegeRight#AccountList#UserRight='SeInteractiveLogonRight' and precedence=1

Platform:
Microsoft Windows Server 2012 R2
Reference:
CCE-37659-0
CPE    1
cpe:/o:microsoft:windows_server_2012::r2:x64
CCE    1
CCE-37659-0
XCCDF    6
xccdf_org.secpod_benchmark_PCI_Windows_2012_R2
xccdf_org.secpod_benchmark_general_Windows_2012_R2
xccdf_org.secpod_benchmark_ISO27001_Windows_2012_R2
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2012_R2
...

© SecPod Technologies