[Forgot Password]
Login  Register Subscribe

23631

 
 

121702

 
 

98218

 
 

909

 
 

79224

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Act as part of the operating system

ID: oval:org.secpod.oval:def:40282Date: (C)2017-04-25   (M)2017-11-21
Class: COMPLIANCEFamily: windows




This policy setting allows a process to assume the identity of any user and thus gain access to the resources that the user is authorized to access. When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers. Vulnerability: The Act as part of the operating system user right is extremely powerful. Anyone with this user right can take complete control of the computer and erase evidence of their activities. Counter Measure: Restrict the Act as part of the operating system user right to as few accounts as possible -it should not even be assigned to the Administrators group under typical circumstances. When a service requires this user right, configure the service to log on with the Local System account, which has this privilege inherently. Do not create a separate account and assign this user right to it. Potential Impact: There should be little or no impact because the Act as part of the operating system user right is rarely needed by any accounts other than the Local System account. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Act as part of the operating system (2) REG: NO INFO

Platform:
Microsoft Windows Server 2016
Reference:
CCE-46917-1
CPE    1
cpe:/o:microsoft:windows_server_2016:::x64
CCE    1
CCE-46917-1
XCCDF    3
xccdf_org.secpod_benchmark_general_Windows_Server_2016
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2016
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2016

© 2013 SecPod Technologies