WPAW-00-001200 - The domain must be configured to restrict privileged administrator accounts from logging on to lower-tier hosts - Deny log on as a batch job

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If the domain is not configured to restrict privileged administrator accounts from logging on to lower-tier hosts, it would be impossible to isolate administrative accounts to specific trust zones and protect IT resources from threats from high-risk trust zones. Blocking logon to lower-tier assets helps protect IT resources in a tier from being attacked from a lower tier.

Solution

Configure domain systems to prevent higher-tier administrative accounts from logging on to lower-tier hosts.

Assign higher-tier administrative groups to the Deny log on user rights of lower-tier hosts. This includes the following user rights:

Deny log on as a batch job
Deny log on as a service
Deny log on locally

Domain and Enterprise Admins are currently required to be included in the appropriate deny user rights in the Windows STIGs for member servers and workstations.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_PAW_V2R2_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-243453r722930_rule, STIG-ID|WPAW-00-001200, STIG-Legacy|SV-92873, STIG-Legacy|V-78167, Vuln-ID|V-243453

Plugin: Windows

Control ID: 83af33f0bff80488a2562c33ace30ec2f5a29c575e4035e8c55a633aa99178f2