UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Windows 2008 accounts must be configured to require passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7002 4.017 SV-29549r2_rule High
Description
The lack of password protection enables anyone to gain access to the information system, which opens a backdoor opportunity for intruders to compromise the system as well as other resources.
STIG Date
Windows 2008 Domain Controller Security Technical Implementation Guide 2018-05-25

Details

Check Text ( C-79567r1_chk )
Review the password required status for enabled user accounts.

PowerShell must be installed on Windows 2008 to run the following.

Open "Windows PowerShell" with elevated privileges (run as administrator).

Domain Controllers:

Enter 'Get-WMIObject -Class Win32_Useraccount -Filter "PasswordRequired=False" | FT Name, PasswordRequired, Disabled, Domain -AutoSize'.

Exclude disabled accounts (e.g., Guest).
Domain accounts requiring smart card (CAC/PIV) may also be excluded.

If any enabled user accounts are returned with a "PasswordRequired" status of "False", this is a finding.

Member servers and standalone systems:

Enter 'Get-WMIObject -Class Win32_Useraccount -Filter "PasswordRequired=False and LocalAccount=True" | FT Name, PasswordRequired, Disabled, LocalAccount'.

Exclude disabled accounts (e.g., Guest).

If any enabled user accounts are returned with a "PasswordRequired" status of "False", this is a finding.

Note: Other queries or tools may be used. The organization must be able to demonstrate the results are valid and meet the intent of the requirement.
Fix Text (F-86705r1_fix)
Configure all enabled accounts to require passwords.

The password required flag can be set by entering the following on a command line: "Net user [username] /passwordreq:yes", substituting [username] with the name of the user account.