WN19-UR-000200 - Windows Server 2019 Profile single process user right must only be assigned to the Administrators group.

Information

Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities.

Accounts with the 'Profile single process' user right can monitor non-system processes performance. An attacker could use this to identify processes to attack.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> 'Profile single process' to include only the following accounts or groups:

- Administrators

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V3R4_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10), CAT|II, CCI|CCI-002235, Rule-ID|SV-205766r958726_rule, STIG-ID|WN19-UR-000200, STIG-Legacy|SV-103171, STIG-Legacy|V-93083, Vuln-ID|V-205766

Plugin: Windows

Control ID: 26e6ba94d2177f21d2ab820401757d0078d9d384311a67d9362c29817c16b0b2