Skip to Content
Windows Security Monitoring
book

Windows Security Monitoring

by Andrei Miroshnikov
April 2018
Intermediate to advanced
648 pages
14h 51m
English
Wiley
Content preview from Windows Security Monitoring

CHAPTER 11Logon Rights and User Privileges

Logon rights and user privileges are essential security mechanisms embedded in Microsoft Windows operating systems. Logon rights are designed to allow or limit the ability of accounts to use specific logon methods, such as Interactive logon or Network logon. User privileges control access to the most sensitive system operations, such as shutting down the system or managing the security event log.

In this chapter you will find detailed information about monitoring logon rights and user privileges policy changes, user privileges use, and use of backup and restore privileges.

Logon Rights

As you read in Chapter 4, multiple logon types exist in the Microsoft Windows world. If you review Figure 4-1, you will see that at Step 10 lsass.exe verifies user logon rights. Logon rights verification is also performed for other logon types, such as the RemoteInteractive and Network logon types. To allow or deny a specific logon type for an account, there's a set of security group policy settings available on Windows systems for configuration. These settings are located in the Local Computer Policy\Computer Configuration\Windows Settings\Security Settings\Local Policies\User Right Assignments group policy path. Table 11-1 contains a list of group policy settings related to user rights and the corresponding logon types for each group policy setting.

Table 11-1: Logon Rights and Related Logon Types

GROUP POLICY SETTING NAME LOGON RIGHT NAME ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Windows Security and Hardening

Mastering Windows Security and Hardening

Mark Dunkerley, Matt Tumbarello
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781119390640Purchase book