Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-7002 | 4.017 | SV-32270r2_rule | High |
Description |
---|
The lack of password protection enables anyone to gain access to the information system, which opens a backdoor opportunity for intruders to compromise the system as well as other resources within the same administrative domain. |
STIG | Date |
---|---|
Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide | 2018-03-07 |
Check Text ( C-78969r5_chk ) |
---|
Review the password required status for enabled user accounts. Open "Windows PowerShell" with elevated privileges (run as administrator). Domain Controllers: Enter "Import-Module ActiveDirectory". (This only needs to be run once during a PowerShell session.) Enter 'Get-ADUser -Filter * -Properties PasswordNotRequired | Where {$_.PasswordNotRequired -eq "True"} | FT Name, PasswordNotRequired, Enabled -AutoSize'. Exclude disabled accounts (e.g., Guest). Domain accounts requiring smart card (CAC/PIV) may also be excluded. If "PasswordNotRequired" is "True" for any enabled user account, this is a finding. Member servers and standalone systems: Enter 'Get-WMIObject -Class Win32_Useraccount -Filter "PasswordRequired=False and LocalAccount=True" | FT Name, PasswordRequired, Disabled, LocalAccount -AutoSize'. Exclude disabled accounts (e.g., Guest). If any enabled user accounts are returned with a "PasswordRequired" status of "False", this is a finding. Note: Other queries or tools may be used. The organization must be able to demonstrate the results are valid and meet the intent of the requirement. |
Fix Text (F-86127r1_fix) |
---|
Configure all enabled accounts to require passwords. The password required flag can be set by entering the following on a command line: "Net user [username] /passwordreq:yes", substituting [username] with the name of the user account. |