Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
WN12-00-000005 | WN12-00-000005 | WN12-00-000005_rule | High |
Description |
---|
Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges. |
STIG | Date |
---|---|
Microsoft Windows Server 2012 Domain Controller Security Technical Implementation Guide | 2013-07-25 |
Check Text ( C-WN12-00-000005_chk ) |
---|
Verify each user with administrative privileges has been assigned a unique administrative account separate from their standard user account. The IAO must maintain a list of all users belonging to the Administrators group. If users with administrative privileges do not have separate accounts for administrative functions and standard user functions, this is a finding. |
Fix Text (F-WN12-00-000005_fix) |
---|
Ensure each user with administrative privileges has a separate account for user duties and one for privileged duties. |