UCF STIG Viewer Logo

Built-in administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36770 WN08-RG-000003 SV-48456r1_rule ECCD-1 Medium
Description
A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With User Account Control enabled, filtering the privileged token for built-in administrator accounts will prevent the elevated privileges of these accounts from being used over the network.
STIG Date
Windows 8 Security Technical Implementation Guide 2013-02-15

Details

Check Text ( C-45119r1_chk )
If the following registry value does not exist or is not configured as specified, this is a finding:

Registry Hive: HKEY_LOCAL_MACHINE
Subkey: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

Value Name: LocalAccountTokenFilterPolicy

Type: REG_DWORD
Value: 0
Fix Text (F-41583r1_fix)
Configure the following registry value:

Registry Hive: HKEY_LOCAL_MACHINE
Subkey: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

Value Name: LocalAccountTokenFilterPolicy

Type: REG_DWORD
Value: 0