This is not the latest version of the STIG. This is provided for archival purposes. See the latest STIG.

The Secondary Logon service must be disabled on Windows 11.

STIG ID: WN11-00-000175  |  SRG: SRG-OS-000095-GPOS-00049 |  Severity: medium (CAT II)  |  CCI: CCI-000381 |  Vulnerability Id: V-253289

Vulnerability Discussion

The Secondary Logon service provides a means for entering alternate credentials, typically used to run commands with elevated privileges. Using privileged credentials in a standard user session can expose those credentials to theft.

Check

Run "Services.msc".

Locate the "Secondary Logon" service.

If the "Startup Type" is not "Disabled" or the "Status" is "Running", this is a finding.

Fix

Configure the "Secondary Logon" service "Startup Type" to "Disabled".