Security: Deny log on as a batch job user right on Domain Joined members must be configured to prevent unauthenticated access

2d81fe43-511f-4266-b631-18a5ed060fb5

Deny log on as a batch job user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and from unauthenticated access on all systems

Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities.

The "Deny log on as a batch job" user right defines accounts that are prevented from logging on to the system as a batch job, such as Task Scheduler.

In an Active Directory Domain, denying logons to the Enterprise Admins and Domain Admins groups on lower-trust systems helps mitigate the risk of privilege escalation from credential theft attacks, which could lead to the compromise of an entire domain.

The Guests group must be assigned to prevent unauthenticated access.

Remediation

To fix this configure the policy value for
Computer Configuration
|_ Windows Settings
|_ Security Settings
|_ Local Policies
|_ User Rights Assignment
|_ Deny log on as a batch job to include the following:
Domain Systems Only:
- Enterprise Admins Group
- Domain Admins Group
All Systems:
- Guests Group

STIG: Server
2025: https://system32.eventsentry.com/stig/viewer/V-278185
2022: https://system32.eventsentry.com/stig/viewer/V-254436
2019: https://system32.eventsentry.com/stig/viewer/V-205673
2016: https://system32.eventsentry.com/stig/viewer/V-225016

Desktop
W11: https://system32.eventsentry.com/stig/viewer/V-253492
W10: https://system32.eventsentry.com/stig/viewer/V-220969

NIST 800-53 : AC-3, AC-6, CM-6
NIST 800-171: 3.1.1, 3.1.2, 3.4.6
CMMC v2.0 L2: AC.L2-3.1.1, AC.L2-3.1.2, CM.L2-3.4.6
PCI-DSS v4.0: 2.2.1, 7.2.1
HIPAA SR : ยง164.312(a)(1)
HIPAA HICP : Practice 3 (Identity and Access Management)