Accounts: Automatic logons must be disabled

5db60bfa-0318-430e-ab7e-c2ff3e749ae9

Allowing a system to automatically log on when the machine is booted could give access to any unauthorized individual who restarts the computer. Automatic logon with administrator privileges would give full access to an unauthorized individual.

Remediation

To fix this configure the policy value for:
Computer Configuration
|_ Administrative Template
|_ MSS (Legacy)
|_ MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) to "Disabled".

This policy setting requires the installation of the MSS-Legacy custom template. "MSS-Legacy.admx" and " MSS-Legacy.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively. Files are available at EventSentry GitHub Repository at: https://github.com/eventsentry/resources

Stig Desktop:
W10: https://www.stigviewer.com/stig/windows_10/2016-06-08/finding/V-63551

NIST 800-53: CM-6b. A-2, IA-5(13)
CCE: CCE-85419-0
CCI: CCI-000366
STIG-ID: APPL-11-002066