1.3.2 Act as part of the operating system

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Level 1, Scorable
This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local
resources as that user. Processes that require this privilege should use the LocalSystem account, which already includes this privilege,
rather than using a separate user account with this privilege specially assigned. If your organization only uses servers that are members
of the Windows Server 2003 family, you do not need to assign this privilege to your users. However, if your organization uses servers
running Windows 2000 or Windows NT 4.0, you might need to assign this privilege to use applications that exchange passwords in plaintext.
Assigning this user right can be a security risk. Only assign this user right to trusted users.
This permission is necessary for SQL Server to operate.
ref. https://benchmarks.cisecurity.org/tools2/sqlserver/CIS_Microsoft_SQL_Server_2005_Benchmark_v2.0.0.pdf, pg 21.
NOTE: Update {SQL_SERVICE_ACCT} with the appropriate value for the local environment