SV-225019r569186_rule
V-225019
SRG-OS-000297-GPOS-00115
WN16-MS-000410
CAT II
10
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on through Remote Desktop Services" to include the following:
Domain Systems Only:
- Enterprise Admins group
- Domain Admins group
- Local account (see Note below)
All Systems:
- Guests group
Note: "Local account" is referring to the Windows built-in security group.
This applies to member servers and standalone systems. A separate version applies to domain controllers.
Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment.
If the following accounts or groups are not defined for the "Deny log on through Remote Desktop Services" user right, this is a finding.
Domain Systems Only:
- Enterprise Admins group
- Domain Admins group
- Local account (see Note below)
All Systems:
- Guests group
For server core installations, run the following command:
Secedit /Export /Areas User_Rights /cfg c:\path\filename.txt
Review the text file.
If the following SIDs are not defined for the "SeDenyRemoteInteractiveLogonRight" user right, this is a finding.
Domain Systems Only:
S-1-5-root domain-519 (Enterprise Admins)
S-1-5-domain-512 (Domain Admins)
S-1-5-113 ("Local account")
All Systems:
S-1-5-32-546 (Guests)
Note: "Local account" is referring to the Windows built-in security group.
V-225019
False
WN16-MS-000410
This applies to member servers and standalone systems. A separate version applies to domain controllers.
Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment.
If the following accounts or groups are not defined for the "Deny log on through Remote Desktop Services" user right, this is a finding.
Domain Systems Only:
- Enterprise Admins group
- Domain Admins group
- Local account (see Note below)
All Systems:
- Guests group
For server core installations, run the following command:
Secedit /Export /Areas User_Rights /cfg c:\path\filename.txt
Review the text file.
If the following SIDs are not defined for the "SeDenyRemoteInteractiveLogonRight" user right, this is a finding.
Domain Systems Only:
S-1-5-root domain-519 (Enterprise Admins)
S-1-5-domain-512 (Domain Admins)
S-1-5-113 ("Local account")
All Systems:
S-1-5-32-546 (Guests)
Note: "Local account" is referring to the Windows built-in security group.
M
4205