Microsoft Windows Server 2016

Permissions for the system drive root directory (usually C:\) must conform to minimum requirements

STIG ID: WN16-00-000160 | SRG: SRG-OS-000312-GPOS-00122 | Severity: Medium | CCI: CCI-002165 | Vulnerability ID: V-224832

Description

Changing the system's file and directory permissions allows the possibility of unauthorized and anonymous modification to the operating system and installed applications.The default permissions are adequate when the Security Option "Network access: Let everyone permissions apply to anonymous users" is set to "Disabled" (WN16-SO-000290).Satisfies: SRG-OS-000312-GPOS-00122, SRG-OS-000312-GPOS-00123, SRG-OS-000312-GPOS-00124

Check

The default permissions are adequate when the Security Option "Network access: Let everyone permissions apply to anonymous users" is set to "Disabled" (WN16-SO-000290).Review the permissions for the system drive's root directory (usually C:\). Non-privileged groups such as Users or Authenticated Users must not have greater than "Read & execute" permissions except where noted as defaults. (Individual accounts must not be used to assign permissions.)If permissions are not as restrictive as the default permissions listed below, this is a finding.Viewing in File Explorer:View the Properties of the system drive's root directory.Select the "Security" tab, and the "Advanced" button.Default permissions:C:\Type - "Allow" for allInherited from - "None" for allPrincipal - Access - Applies toSYSTEM - Full control - This folder, subfolders, and filesAdministrators - Full control - This folder, subfolders, and filesUsers - Read & execute - This folder, subfolders, and filesUsers - Create folders/append data - This folder and subfoldersUsers - Create files/write data - Subfolders onlyCREATOR OWNER - Full Control - Subfolders and files onlyAlternately, use icacls:Open "Command Prompt (Admin)".Enter "icacls" followed by the directory:"icacls c:\"The following results should be displayed:c:\NT AUTHORITY\SYSTEM:(OI)(CI)(F)BUILTIN\Administrators:(OI)(CI)(F)BUILTIN\Users:(OI)(CI)(RX)BUILTIN\Users:(CI)(AD)BUILTIN\Users:(CI)(IO)(WD)CREATOR OWNER:(OI)(CI)(IO)(F)Successfully processed 1 files; Failed processing 0 files

Fix

Maintain the default permissions for the system drive's root directory and configure the Security Option "Network access: Let everyone permissions apply to anonymous users" to "Disabled" (WN16-SO-000290).Default PermissionsC:\Type - "Allow" for allInherited from - "None" for allPrincipal - Access - Applies toSYSTEM - Full control - This folder, subfolders, and filesAdministrators - Full control - This folder, subfolders, and filesUsers - Read & execute - This folder, subfolders, and filesUsers - Create folders/append data - This folder and subfoldersUsers - Create files/write data - Subfolders onlyCREATOR OWNER - Full Control - Subfolders and files only