Allow log on locally
|ID: oval:org.secpod.oval:def:36559||Date: (C)2016-08-05 (M)2017-11-21|
|Class: COMPLIANCE||Family: windows|
Determines which users can log on to the computer.
Modifying this setting may affect compatibility with clients, services, and applications. For compatibility information about this setting, see Allow log on locally (http://go.microsoft.com/fwlink/?LinkId=24268 ) at the Microsoft website.
* On workstations and servers: Administrators, Backup Operators, Power Users, Users, and Guest.
* On domain controllers: Account Operators, Administrators, Backup Operators, and Print Operators.
For domain controllers, assign the Allow log on locally user right only to the Administrators group. For other server roles, you may choose to add Backup Operators as well as Administrators. For end-user computers you should also assign this right to the Users group.
Alternatively, you can assign groups such as Account Operators, Server Operators, and Guests to the Deny Log on Locally user right.
If you remove these default groups, you could limit the abilities of users who are assigned to specific administrative roles in your environment. If you have installed optional components such as ASP.NET or Internet Information Services, you may need to assign Allow log on locally user right to additional accounts that are required by those components. For example, IIS 6 requires that this user right be assigned to the IUSR_<ComputerName> account for certain features; see 'Default permissions and user rights for IIS 6.0' for more information: http://support.microsoft.com/?id=812614. You should confirm that delegated activities will not be adversely affected by any changes that you make to the Allow log on locally user rights assignments.
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on locally
(2) REG: ###
(3) WMI: root\rsop\computer#RSOP_UserPrivilegeRight#AccountList#UserRight='SeInteractiveLogonRight' and precedence=1
|Microsoft Windows 10|