Information
This policy setting determines which user accounts will have the right to attach a debugger to any process or to the kernel, which provides complete access to sensitive and critical operating system components. Developers who are debugging their own applications do not need to be assigned this user right; however, developers who are debugging new system components will need it.
The recommended state for this setting is: *S-1-5-32-544 (Administrators).
Note: This user right is considered a 'sensitive privilege' for the purposes of auditing.
The Debug programs user right can be exploited to capture sensitive computer information from system memory, or to access and modify kernel or application structures. Some attack tools exploit this user right to extract hashed passwords and other private security information, or to insert rootkit code. By default, the Debug programs user right is assigned only to administrators, which helps to mitigate the risk from this vulnerability.
Solution
To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to *S-1-5-32-544 (Administrators).
User Rights\Debug Programs
Note: Include only one User or Group per line in the Settings Catalog configuration screen.
Impact:
If you revoke this user right, no one will be able to debug programs. However, typical circumstances rarely require this capability on production computers.