[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Deny log on as a service

ID: oval:org.secpod.oval:def:83638Date: (C)2022-09-02   (M)2023-05-09
Class: COMPLIANCEFamily: windows




This security setting determines which service accounts are prevented from registering a process as a service. This policy setting supersedes the Log on as a service policy setting if an account is subject to both policies. Note: This security setting does not apply to the System, Local Service, or Network Service accounts. Default: None. Counter Measure: We recommend that you not assign the Deny log on as a service user right to any accounts, which is the default configuration. Organizations that are extremely concerned about security may wish to assign this user right to groups and accounts that they are certain will never need to log on as a service. Potential Impact: If you assign the Deny log on as a service user right to specific accounts, services may not be able to start and a DoS condition could result. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on as a service (2) REG: ### (3) WMI: root\rsop\computer#RSOP_UserPrivilegeRight#AccountList#UserRight=SeDenyServiceLogonRight and precedence=1

Platform:
Microsoft Windows Server 2016
Reference:
CCE-47703-4
CPE    1
cpe:/o:microsoft:windows_server_2016
CCE    1
CCE-47703-4
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_Server_2016

© SecPod Technologies