STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Microsoft Windows PAW Security Technical Implementation Guide

V-243457

CAT II (Medium)

The Windows PAW must be configured to enforce two-factor authentication and use Active Directory for authentication management.

Rule ID

SV-243457r1015765_rule

STIG

Microsoft Windows PAW Security Technical Implementation Guide

Version

V3R3

CCIs

CCI-000765CCI-000767

Discussion

Due to the highly privileged functions of a PAW, a high level of trust must be implemented for access to the PAW, including nonrepudiation of the user session. One-factor authentication, including username and password and shared administrator accounts, does not provide adequate assurance.

Check Content

Review the configuration on the PAW.

Verify group policy is configured to enable either smart card or another DOD-approved two-factor authentication method for site PAWs.

- In Active Directory, go to Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options.
- Verify "Interactive logon: Require Windows Hello for Business or smart card" is set to "Enabled".

If group policy is not configured to enable either smart card or another DOD-approved two-factor authentication method, this is a finding.

Fix Text

In Active Directory, configure group policy to enable either smart card or another DOD-approved two-factor authentication method for all PAWs.

- Go to Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options.
- Set "Interactive logon: Require Windows Hello for Business or smart card" to "Enabled".