UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

A group named DenyNetworkAccess must be defined on domain systems to include all local administrator accounts. (Windows 8)


Overview

Finding ID Version Rule ID IA Controls Severity
V-45589 WN08-GE-000200 SV-58423r1_rule ECLP-1 Low
Description
Several user rights on domain systems require that local administrator accounts be assigned to them. Defining a consistent group name allows compliance to be more easily determined.
STIG Date
Windows 8 / 8.1 Security Technical Implementation Guide 2014-07-03

Details

Check Text ( None )
None
Fix Text (F-49941r3_fix)
This requirement is NA for non domain-joined systems.
*This requirement is NA for Windows 8.1 systems using the new built-in security groups below.

Create a local group with the name "DenyNetworkAccess" if one does not exist on the system.
Include all local administrator accounts as members of the group, including the built-in Administrator account.

*Windows 8.1 added new built-in security groups for assigning permissions and rights to local accounts. Use these groups instead of creating a group for local administrator accounts to apply to deny rights where required. Assign the group "Local account and member of Administrators group" or the more restrictive "Local account".