Profile single process
- Windows 11
- Windows 10
Describes the best practices, location, values, policy management, and security considerations for the Profile single process security policy setting.
This policy setting determines which users can view a sample performance of an application process. Typically, you don't need this user right to use the performance reporting tools included in the operating system. However, you do need this user right if the system’s monitor components are configured to collect data through Windows Management Instrumentation (WMI).
- User-defined list of accounts
- Not Defined
- This right shouldn't be granted to individual users. It should be granted only for trusted applications that monitor other programs.
Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment
By default this setting is Administrators on domain controllers and on stand-alone servers.
The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page.
|Server type or Group Policy Object (GPO)||Default value|
|Default Domain Policy||Not defined|
|Default Domain Controller Policy||Administrators|
|Stand-Alone Server Default Settings||Administrators|
|Domain Controller Effective Default Settings||Administrators|
|Member Server Effective Default Settings||Administrators|
|Client Computer Effective Default Settings||Administrators|
This section describes features, tools, and guidance to help you manage this policy.
A restart of the device isn't required for this policy setting to be effective.
Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on.
Settings are applied in the following order through a Group Policy Object, which will overwrite settings on the local computer at the next Group Policy update:
- Local policy settings
- Site policy settings
- Domain policy settings
- OU policy settings
When a local setting is greyed out, it indicates that a GPO currently controls that setting.
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
The Profile single process user right presents a moderate vulnerability. Attackers with this user right could monitor a computer's performance to help identify critical processes that they might want to attack directly. Attackers may be able to determine what processes run on the computer so that they could identify countermeasures that they may need to avoid, such as anti-virus software or an intrusion-detection system. They could also identify other users who are signed in to a computer.
Ensure that only the local Administrators group is assigned the Profile single process user right.
If you remove the Profile single process user right from the Power Users group or other accounts, you could limit the abilities of users who are assigned to specific administrative roles in your environment. You should ensure that delegated tasks aren't negatively affected.