1. Home
  2. Security Hardening
  3. CIS Microsoft Windows Server 2016 STIG DC STIG V1.1.0
  4. Ensure ‘Enable computer and user accounts to be trusted for delegation’ is set to ‘Administrators’ (DC only)

Ensure ‘Enable computer and user accounts to be trusted for delegation’ is set to ‘Administrators’ (DC only)

Details

This policy setting allows users to change the Trusted for Delegation setting on a computer object in Active Directory. Abuse of this privilege could allow unauthorized users to impersonate other users on the network.

The recommended state for this setting is: Administrators.

Note: This user right is considered a ‘sensitive privilege’ for the purposes of auditing.

Rationale:

Misuse of the Enable computer and user accounts to be trusted for delegation user right could allow unauthorized users to impersonate other users on the network. An attacker could exploit this privilege to gain access to network resources and make it difficult to determine what has happened after a security incident.

Impact:

None – this is the default behavior.

Solution

To establish the recommended configuration via GP, configure the following UI path:

Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesUser Rights AssignmentEnable computer and user accounts to be trusted for delegation

Default Value:

Administrators.

Additional Information:

Microsoft Windows Server 2016 Security Technical Implementation Guide:
Version 2, Release 2, Benchmark Date: May 04, 2021

Vul ID: V-225005
Rule ID: SV-225005r569186_rule
STIG ID: WN16-DC-000420
Severity: CAT II

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles