[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

User Account Control: Only elevate executables that are signed and validated

ID: oval:org.secpod.oval:def:8818Date: (C)2013-01-21   (M)2023-05-09
Class: COMPLIANCEFamily: windows




The User Account Control: Only elevate executables that are signed and validated setting should be configured correctly. This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. The options are: * Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. * Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Only elevate executables that are signed and validated (2) KEY: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10922-3
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10922-3
XCCDF    5
xccdf_org.secpod_benchmark_HIPAA_45CFR_164_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_SecPod_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_general_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2008_R2
...

© SecPod Technologies