[Forgot Password]
Login  Register Subscribe

23631

 
 

122628

 
 

98503

 
 

909

 
 

79321

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Lock pages in memory

ID: oval:org.secpod.oval:def:40213Date: (C)2017-04-25   (M)2017-11-21
Class: COMPLIANCEFamily: windows




This policy setting allows a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. If this user right is assigned, significant degradation of system performance can occur. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. Vulnerability: Users with the Lock pages in memory user right could assign physical memory to several processes, which could leave little or no RAM for other processes and result in a DoS condition. Counter Measure: Do not assign the Lock pages in memory user right to any accounts. Potential Impact: None. This is the default configuration. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Lock pages in memory (2) REG: NO INFO

Platform:
Microsoft Windows Server 2016
Reference:
CCE-47319-9
CPE    1
cpe:/o:microsoft:windows_server_2016:::x64
CCE    1
CCE-47319-9
XCCDF    3
xccdf_org.secpod_benchmark_general_Windows_Server_2016
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2016
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2016

© 2013 SecPod Technologies