Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-63597 | WN10-RG-000010 | SV-78087r1_rule | Medium |
Description |
---|
A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With User Account Control enabled, filtering the privileged token for built-in administrator accounts will prevent the elevated privileges of these accounts from being used over the network. |
STIG | Date |
---|---|
Windows 10 Security Technical Implementation Guide | 2016-10-28 |
Check Text ( None ) |
---|
None |
Fix Text (F-69527r1_fix) |
---|
If the system is not a member of a domain, this is NA. Configure the following registry value: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ Value Name: LocalAccountTokenFilterPolicy Value Type: REG_DWORD Value: 0 |