STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Microsoft Windows PAW Security Technical Implementation Guide

V-243457

CAT II (Medium)

The Windows PAW must be configured to enforce two-factor authentication and use Active Directory for authentication management.

Rule ID

SV-243457r1015765_rule

STIG

Microsoft Windows PAW Security Technical Implementation Guide

Version

V3R3

CCIs

CCI-000765CCI-000767

Discussion

Due to the highly privileged functions of a PAW, a high level of trust must be implemented for access to the PAW, including nonrepudiation of the user session. One-factor authentication, including username and password and shared administrator accounts, does not provide adequate assurance.

Check Content

Review the configuration on the PAW.

Verify group policy is configured to enable either smart card or another DOD-approved two-factor authentication method for site PAWs.

- In Active Directory, go to Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options.
- Verify "Interactive logon: Require Windows Hello for Business or smart card" is set to "Enabled".

If group policy is not configured to enable either smart card or another DOD-approved two-factor authentication method, this is a finding.

Fix Text

In Active Directory, configure group policy to enable either smart card or another DOD-approved two-factor authentication method for all PAWs.

- Go to Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options.
- Set "Interactive logon: Require Windows Hello for Business or smart card" to "Enabled".