Act as part of the operating system
|ID: oval:org.secpod.oval:def:40282||Date: (C)2017-04-25 (M)2018-07-10|
|Class: COMPLIANCE||Family: windows|
This policy setting allows a process to assume the identity of any user and thus gain access to the resources that the user is authorized to access.
When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers.
The Act as part of the operating system user right is extremely powerful. Anyone with this user right can take complete control of the computer and erase evidence of their activities.
Restrict the Act as part of the operating system user right to as few accounts as possible -it should not even be assigned to the Administrators group under typical circumstances. When a service requires this user right, configure the service to log on with the Local System account, which has this privilege inherently. Do not create a separate account and assign this user right to it.
There should be little or no impact because the Act as part of the operating system user right is rarely needed by any accounts other than the Local System account.
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Act as part of the operating system
(2) REG: NO INFO
|Microsoft Windows Server 2016|