Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-36770 | WN08-RG-000003 | SV-48456r1_rule | ECCD-1 | Medium |
Description |
---|
A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With User Account Control enabled, filtering the privileged token for built-in administrator accounts will prevent the elevated privileges of these accounts from being used over the network. |
STIG | Date |
---|---|
Windows 8 Security Technical Implementation Guide | 2013-02-15 |
Check Text ( C-45119r1_chk ) |
---|
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Subkey: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Value Name: LocalAccountTokenFilterPolicy Type: REG_DWORD Value: 0 |
Fix Text (F-41583r1_fix) |
---|
Configure the following registry value: Registry Hive: HKEY_LOCAL_MACHINE Subkey: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Value Name: LocalAccountTokenFilterPolicy Type: REG_DWORD Value: 0 |