Details
This policy setting allows users to configure the system-wide environment variables that affect hardware configuration. This information is typically stored in the Last Known Good Configuration. Modification of these values and could lead to a hardware failure that would result in a denial of service condition.
The recommended state for this setting is: Administrators.
Note: This user right is considered a ‘sensitive privilege’ for the purposes of auditing.
Rationale:
Anyone who is assigned the Modify firmware environment values user right could configure the settings of a hardware component to cause it to fail, which could lead to data corruption or a DoS condition.
Impact:
None – this is the default behavior.
Solution
To establish the recommended configuration via GP, set the following UI path to Administrators:
Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesUser Rights AssignmentModify firmware environment values
Default Value:
Administrators.
Additional Information:
Microsoft Windows Server 2019 Security Technical Implementation Guide:
Version 2, Release 1, Benchmark Date: November 13, 2020
Vul ID: V-205764
Rule ID: SV-205764r569188_rule
STIG ID: WN19-UR-000180
Severity: CAT II
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Windows.