UCF STIG Viewer Logo

A non-administrator account will not have Administrator rights on the system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1127 4.027 SV-32254r1_rule ECPA-1 Medium
Description
A user who does not have administrator duties should not have Administrator rights. Such rights would allow the account to bypass or modify required security restrictions on that machine and make it vulnerable to attack from both internal and external sources.
STIG Date
Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide 2012-07-02

Details

Check Text ( C-32920r1_chk )
If an account without administrator duties is a member of administrative groups, then this is a finding.

Run the DUMPSEC utility.
Select “Dump Users as Table” from the “Report” menu.
Select the following available fields and click the “Add” button:
UserName
SID
PswdRequired
PswdExpires
LastLogonTime
AcctDisabled
Groups

Review the results for unauthorized members of the administrative groups.

Documentable Explanation: Approved exceptions to this requirement should be documented with the IAO.

Fix Text (F-5773r1_fix)
Configure the system to prevent non-administrators from having administrator rights.