WN10-00-000080 - Only authorized user accounts must be allowed to create or run virtual machines on Windows 10 systems.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Allowing other operating systems to run on a secure system may allow users to circumvent security. For Hyper-V, preventing unauthorized users from being assigned to the Hyper-V Administrators group will prevent them from accessing or creating virtual machines on the system. The Hyper-V Hypervisor is used by Virtualization Based Security features such as Credential Guard on Windows 10; however, it is not the full Hyper-V installation.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

For Hyper-V, remove any unauthorized groups or user accounts from the 'Hyper-V Administrators' group.

For hosted hypervisors other than Hyper-V, restrict access to create or run virtual machines to authorized user accounts only.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_10_V2R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000381, Rule-ID|SV-220714r569187_rule, STIG-ID|WN10-00-000080, STIG-Legacy|SV-77855, STIG-Legacy|V-63365, Vuln-ID|V-220714

Plugin: Windows

Control ID: 62bb5628784249e59a8ccc70cf2f86716d7658fc39b5f34e4f97e003f8990aa8