SV-225015r569186_rule
V-225015
SRG-OS-000080-GPOS-00048
WN16-MS-000370
CAT II
10
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny access to this computer from the network" to include the following:
Domain Systems Only:
- Enterprise Admins group
- Domain Admins group
- "Local account and member of Administrators group" or "Local account" (see Note below)
All Systems:
- Guests group
Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
This applies to member servers and standalone systems. A separate version applies to domain controllers.
Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment.
If the following accounts or groups are not defined for the "Deny access to this computer from the network" user right, this is a finding.
Domain Systems Only:
- Enterprise Admins group
- Domain Admins group
- "Local account and member of Administrators group" or "Local account" (see Note below)
All Systems:
- Guests group
For server core installations, run the following command:
Secedit /Export /Areas User_Rights /cfg c:\path\filename.txt
Review the text file.
If the following SIDs are not defined for the "SeDenyNetworkLogonRight" user right, this is a finding.
Domain Systems Only:
S-1-5-root domain-519 (Enterprise Admins)
S-1-5-domain-512 (Domain Admins)
S-1-5-114 ("Local account and member of Administrators group") or S-1-5-113 ("Local account")
All Systems:
S-1-5-32-546 (Guests)
Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
V-225015
False
WN16-MS-000370
This applies to member servers and standalone systems. A separate version applies to domain controllers.
Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment.
If the following accounts or groups are not defined for the "Deny access to this computer from the network" user right, this is a finding.
Domain Systems Only:
- Enterprise Admins group
- Domain Admins group
- "Local account and member of Administrators group" or "Local account" (see Note below)
All Systems:
- Guests group
For server core installations, run the following command:
Secedit /Export /Areas User_Rights /cfg c:\path\filename.txt
Review the text file.
If the following SIDs are not defined for the "SeDenyNetworkLogonRight" user right, this is a finding.
Domain Systems Only:
S-1-5-root domain-519 (Enterprise Admins)
S-1-5-domain-512 (Domain Admins)
S-1-5-114 ("Local account and member of Administrators group") or S-1-5-113 ("Local account")
All Systems:
S-1-5-32-546 (Guests)
Note: These are built-in security groups. "Local account" is more restrictive but may cause issues on servers such as systems that provide failover clustering.
M
4205