1. Home
  2. Security Hardening
  3. CIS Microsoft Windows 10 Enterprise Release 1903 V1.7.1 L1 Bl Ng
  4. Ensure ‘Profile single process’ is set to ‘Administrators’

Ensure ‘Profile single process’ is set to ‘Administrators’

Details

This policy setting determines which users can use tools to monitor the performance of non-system processes. Typically, you do not need to configure this user right to use the Microsoft Management Console (MMC) Performance snap-in. However, you do need this user right if System Monitor is configured to collect data using Windows Management Instrumentation (WMI). Restricting the Profile single process user right prevents intruders from gaining additional information that could be used to mount an attack on the system.

The recommended state for this setting is: Administrators.

Rationale:

The Profile single process user right presents a moderate vulnerability. An attacker with this user right could monitor a computer’s performance to help identify critical processes that they might wish to attack directly. The attacker may also be able to determine what processes run on the computer so that they could identify countermeasures that they may need to avoid, such as antivirus software, an intrusion-detection system, or which other users are logged on to a computer.

Solution

To establish the recommended configuration via GP, set the following UI path to Administrators:

Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesUser Rights AssignmentProfile single process

Impact:

None – this is the default behavior.

Default Value:

Administrators.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles