1.252 WN22-SO-000450

Information

Windows Server 2022 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.

GROUP ID: V-254489
RULE ID: SV-254489r958518

UAC is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures non-UAC-compliant applications to run in virtualized file and registry entries in per-user locations, allowing them to run.

Solution

Configure the policy value for

Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Virtualize file and registry write failures to per-user locations to 'Enabled'

See Also

https://workbench.cisecurity.org/benchmarks/22357

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-29(1)

Plugin: Windows

Control ID: d2456c1b6515261d7e544bb9242cb2afbec4bfc94a575dc96b773c6edabc1cba