4.4 KiB
title, description, ms.assetid, ms.pagetype, ms.prod, ms.mktglfcycl, ms.sitesec, author
title | description | ms.assetid | ms.pagetype | ms.prod | ms.mktglfcycl | ms.sitesec | author |
---|---|---|---|---|---|---|---|
Debug programs (Windows 10) | Describes the best practices, location, values, policy management, and security considerations for the Debug programs security policy setting. | 594d9f2c-8ffc-444b-9522-75615ec87786 | security | W10 | deploy | library | brianlic-msft |
Debug programs
Applies to
- Windows 10 Describes the best practices, location, values, policy management, and security considerations for the Debug programs security policy setting.
Reference
This policy setting determines which users can attach to or open any process, even those they do not own. Developers who are debugging their own applications do not need to be assigned this user right. Developers who are debugging new system components need this user right. This user right provides access to sensitive and critical operating-system components. Constant: SeDebugPrivilege
Possible values
- User-defined list of accounts
- Not defined
Best practices
- Assign this user right only to trusted users to reduce security vulnerabilities.
Location
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment
Default values
By default, members of the Administrators group have this right. The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page.
Server type or GPO | Default value |
---|---|
Default Domain Policy |
Not defined |
Default Domain Controller Policy |
Administrators |
Stand-Alone Server Default Settings |
Administrators |
Domain Controller Effective Default Settings |
Administrators |
Member Server Effective Default Settings |
Administrators |
Client Computer Effective Default Settings |
Administrators |