This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Allow log on locally - security policy setting
- 1 contributor
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the Allow log on locally security policy setting.
This policy setting determines which users can start an interactive session on the device. Users must have this user right to log on over a Remote Desktop Services session that is running on a Windows-based member device or domain controller.
Note: Users who do not have this right are still able to start a remote interactive session on the device if they have the Allow logon through Remote Desktop Services right.
Constant: SeInteractiveLogonRight
Possible values
- User-defined list of accounts
- Not Defined
By default, the members of the following groups have this right on workstations and servers:
- Administrators
- Backup Operators
By default, the members of the following groups have this right on domain controllers:
- Account Operators
- Enterprise Domain Controllers
- Print Operators
- Server Operators
Best practices
- Restrict this user right to legitimate users who must log on to the console of the device.
- If you selectively remove default groups, you can limit the abilities of users who are assigned to specific administrative roles in your organization.
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment
Default values
The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy's property page.
Policy management
Restarting the device is not required to implement this change.
Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on.
Modifying this setting might affect compatibility with clients, services, and applications. Use caution when removing service accounts that are used by components and by programs on member devices and on domain controllers in the domain from the default domain controller's policy. Also use caution when removing users or security groups that log on to the console of member devices in the domain, or removing service accounts that are defined in the local Security Accounts Manager (SAM) database of member devices or of workgroup devices. If you want to grant a user account the ability to log on locally to a domain controller, you must make that user a member of a group that already has the Allowed logon locally system right or grant the right to that user account. The domain controllers in the domain share the Default Domain Controllers Group Policy Object (GPO). When you grant an account the Allow logon locally right, you are allowing that account to log on locally to all domain controllers in the domain. If the Users group is listed in the Allow log on locally setting for a GPO, all domain users can log on locally. The Users built-in group contains Domain Users as a member.
Group Policy
Group Policy settings are applied through GPOs in the following order, which will overwrite settings on the local computer at the next Group Policy update:
- Local policy settings
- Site policy settings
- Domain policy settings
- OU policy settings
Security considerations
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
Vulnerability
Any account with the Allow log on locally user right can log on to the console of the device. If you do not restrict this user right to legitimate users who must log on to the console of the computer, unauthorized users could download and run malicious software to elevate their privileges.
Countermeasure
For domain controllers, assign the Allow log on locally user right only to the Administrators group. For other server roles, you may choose to add Backup Operators in addition to Administrators. For end-user computers, you should also assign this right to the Users group. Alternatively, you can assign groups such as Account Operators, Server Operators, and Guests to the Deny log on locally user right.
Potential impact
If you remove these default groups, you could limit the abilities of users who are assigned to specific administrative roles in your environment. If you have installed optional components such as ASP.NET or IIS, you may need to assign the Allow log on locally user right to additional accounts that are required by those components. IIS requires that this user right be assigned to the IUSR_ <ComputerName> account. You should confirm that delegated activities are not adversely affected by any changes that you make to the Allow log on locally user rights assignments.
Related topics
- User Rights Assignment
Additional resources
Stack Exchange Network
Stack Exchange network consists of 183 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
What are the defaults for the "user rights assignment" in an AD environment?
In a non-domain environment, gpedit.msc lets me associate various "user rights" (like "create a pagefile" or "create permanent shared objects") with users or accounts. This is in Computer Configuration | Windows Settings | Security Settings | Local Policies | User Rights Assignment.
Where exactly do I do this in AD? (Please don't just say e.g. "Group Policy Management Console". I've looked at all of the tools I can find, especially in GPMC, and I can't see it. I need either very explicit directions or screen snaps.
ADDED: Ok, I think I get it. You create a new GPO, click Edit, and this gets you to the Group Policy Management Editor where I find the familiar path. Then I link my new GPO to the domain or the OU or whatever where I want it to apply.
But I still have a question: none of the rights in the editor come pre-set to anything. Well, that makes sense because it's a brand new GPO. But is there any way to know what the defaults are, defaults that my new GPO will override? For example, what rights do members of the "Domain Admins" group get, by default?
- active-directory
- If the downvoter would like to explain the reason for the downvote, I'd love to read it. I've been looking for this answer for over an hour so "did not do any research" is not the case. – Jamie Hanrahan Commented Oct 17, 2018 at 20:10
2 Answers 2
The defaults are documented in:
Group Policy Settings Reference Spreadsheet https://www.microsoft.com/en-us/download/details.aspx?id=56946
On the Security tab. Covers all versions of Windows. (I don't believe it has been updated for 1809 yet).
It depends on what you're asking.
If you're asking for User Rights Assignment on a single computer, look for Local Security Policy.
If you're asking for User Rights Assignment as a group policy, well, it shows up just fine in my console. Are you using RSAT (Remote Server Administration Tools)? I'm using the RSAT available for Windows 10. Older versions of RSAT (or the version on the domain controller) may be missing some options.
- Yeah... I finally realized (after asking the first form of the question) that you can only see them when you open the Editor. It's surprising to me though that the Default Domain Policy comes with everything "Not defined" and yet the defaults are certainly being applied. Thanks! – Jamie Hanrahan Commented Oct 17, 2018 at 21:32
You must log in to answer this question.
Not the answer you're looking for browse other questions tagged active-directory ..
- The Overflow Blog
- A student of Geoff Hinton, Yann LeCun, and Jeff Dean explains where AI is headed
- Meet the guy responsible for building the Call of Duty game engine
- Featured on Meta
- More network sites to see advertising test
- We’re (finally!) going to the cloud!
Hot Network Questions
- Why did substantial portion of "democracy" voters vote for Trump?
- Connection between Nilpotent Groups and Nilpotent Matrices
- Can two squares intersect in five points? How about in other sets?
- Should I recommend with reservation or omit reference?
- Why Gaussian Process Regression (GPR) is non-parametric?
- What is this finite dimensional algebra?
- Sets of integers with same sum and same sum of reciprocals
- What makes the measles vaccine so effective compared to other vaccines?
- Legally binding Infernal Contracts
- Is it ever reasonable to conclude that the laws of nature have been violated based solely on testimony?
- What happens to a motion under Robert’s Rules of Order if a member resigns from the body mid-deliberation?
- Is there something like Z-score but for highly skewed distributions?
- How to hide some portion of my file
- 208V/120V: What phase is my electric panel? 240V Circuit for Electric Hot-water Heater
- The best way to handle exceptions?
- Why does Hermione say that “Kreacher and Regulus’s family were all safer if they kept to the old pureblood line”?
- Traveling from place to place in 1530
- Why FindRoot needs 10 GB of memory to solve this nonlinear equation?
- Upright mathematical constants: use dotless i
- How to increase OpAmp current output?
- Clear but not glass
- What does "qualify" mean with regard to presidential succession?
- Student sleeps in the class during the lecture
- Can I license artwork that has a mixture of CC BY-SA, public domain, CC0, Pexels licensed images under CC BY-SA?
IMAGES
VIDEO