The "Deny log on as a batch job" user right on domain-joined workstations must be configured to prevent access from highly privileged domain accounts.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-220969 | WN10-UR-000075 | SV-220969r958472_rule | CCI-000213 | medium |
| Description | ||||
| Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Deny log on as a batch job" right defines accounts that are prevented from logging on to the system as a batch job, such as Task Scheduler. In an Active Directory Domain, denying logons to the Enterprise Admins and Domain Admins groups on lower-trust systems helps mitigate the risk of privilege escalation from credential theft attacks that could lead to the compromise of an entire domain. | ||||
| STIG | Date | |||
| Microsoft Windows 10 Security Technical Implementation Guide | 2025-02-25 | |||
Details
Check Text (C-220969r958472_chk)
This requirement is applicable to domain-joined systems. For standalone or nondomain-joined systems, this is NA.
Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment.
If the following groups or accounts are not defined for the "Deny log on as a batch job" right, this is a finding.
Domain Systems Only:
Enterprise Admin Group
Domain Admin Group
Fix Text (F-22673r857199_fix)
This requirement is applicable to domain-joined systems. For standalone or nondomain-joined systems, this is NA.
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment >> "Deny log on as a batch job" to include the following:
Domain Systems Only:
Enterprise Admin Group
Domain Admin Group