[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

User Account Control: Virtualize file and registry write failures to per-user locations

ID: oval:org.secpod.oval:def:8803Date: (C)2013-01-21   (M)2023-05-09
Class: COMPLIANCEFamily: windows




The User Account Control: Virtualize file and registry write failures to per-user locations setting should be configured correctly. This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\\system32, or HKLM\\Software. The options are: * Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. * Disabled: Applications that write data to protected locations fail. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Virtualize file and registry write failures to per-user locations (2) KEY: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10865-4
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10865-4
XCCDF    4
xccdf_org.secpod_benchmark_HIPAA_45CFR_164_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_general_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2008_R2
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2008_R2
...

© SecPod Technologies