Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-36770 | WN08-RG-000003 | SV-48456r2_rule | ECCD-1 | Medium |
Description |
---|
A compromised local administrator account can provide means for an attacker to move laterally between domain systems. With User Account Control enabled, filtering the privileged token for built-in administrator accounts will prevent the elevated privileges of these accounts from being used over the network. |
STIG | Date |
---|---|
Windows 8 / 8.1 Security Technical Implementation Guide | 2014-04-08 |
Check Text ( None ) |
---|
None |
Fix Text (F-41583r1_fix) |
---|
Configure the following registry value: Registry Hive: HKEY_LOCAL_MACHINE Subkey: \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Value Name: LocalAccountTokenFilterPolicy Type: REG_DWORD Value: 0 |