WN19-UR-000200 - Windows Server 2019 Profile single process user right must only be assigned to the Administrators group.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities.

Accounts with the 'Profile single process' user right can monitor non-system processes performance. An attacker could use this to identify processes to attack.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> 'Profile single process' to include only the following accounts or groups:

- Administrators

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V2R8_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002235, Rule-ID|SV-205766r877392_rule, STIG-ID|WN19-UR-000200, STIG-Legacy|SV-103171, STIG-Legacy|V-93083, Vuln-ID|V-205766

Plugin: Windows

Control ID: 0ce8fe6b23428fde4f55f27db7f3f4288a3e4b423f0fc0c36b55ef0986de95d7