The Windows PAW must be configured to enforce two-factor authentication and use Active Directory for authentication management.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-243457 | SRG-OS-000107-GPOS-00054 | WPAW-00-001600 | SV-243457r1015765_rule | 2024-08-27 | 3 |
Description |
---|
Due to the highly privileged functions of a PAW, a high level of trust must be implemented for access to the PAW, including nonrepudiation of the user session. One-factor authentication, including username and password and shared administrator accounts, does not provide adequate assurance. |
ℹ️ Check |
---|
Review the configuration on the PAW. Verify group policy is configured to enable either smart card or another DOD-approved two-factor authentication method for site PAWs. - In Active Directory, go to Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options. - Verify "Interactive logon: Require Windows Hello for Business or smart card" is set to "Enabled". If group policy is not configured to enable either smart card or another DOD-approved two-factor authentication method, this is a finding. |
✔️ Fix |
---|
In Active Directory, configure group policy to enable either smart card or another DOD-approved two-factor authentication method for all PAWs. - Go to Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options. - Set "Interactive logon: Require Windows Hello for Business or smart card" to "Enabled". |