Microsoft Windows Server 2016

The Allow log on through Remote Desktop Services user right must only be assigned to the Administrators group

STIG ID: WN16-DC-000360 | SRG: SRG-OS-000080-GPOS-00048 | Severity: Medium | CCI: CCI-000213 | Vulnerability ID: V-224999

Description

Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities.Accounts with the "Allow log on through Remote Desktop Services" user right can access a system through Remote Desktop.

Check

This applies to domain controllers, it is NA for other systems.Verify the effective setting in Local Group Policy Editor.Run "gpedit.msc".Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment.If any accounts or groups other than the following are granted the "Allow log on through Remote Desktop Services" user right, this is a finding.- AdministratorsFor server core installations, run the following command:Secedit /Export /Areas User_Rights /cfg c:\path\filename.txtReview the text file.If any SIDs other than the following are granted the "SeRemoteInteractiveLogonRight" user right, this is a finding.S-1-5-32-544 (Administrators)

Fix

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Allow log on through Remote Desktop Services" to include only the following accounts or groups:- Administrators