UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

A group must be defined on domain systems to include all local administrator accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-45589 WINGE-000200-MS SV-58479r2_rule ECLP-1 Low
Description
Several user rights on domain systems require that local administrator accounts be assigned to them. This is separate from the built-in Administrators group, which also contains domain administrative accounts/groups. Defining a consistent group name allows compliance to be more easily determined.
STIG Date
Windows Server 2008 R2 Member Server Security Technical Implementation Guide 2016-01-22

Details

Check Text ( None )
None
Fix Text (F-62415r3_fix)
This requirement is NA for non domain-joined systems.

*Apply the patch that creates the new built-in security groups, "Local account" and "Local account and member of Administrators group".

Or create the required groups defined below.

Documentation and scripts supporting the creation of this group to restrict local administrative accounts were changed at one point. The original name, "DeniedNetworkAccess", was changed to "DenyNetworkAccess". Automated benchmarks will look for either of these groups.

Create a local group with the name "DenyNetworkAccess" or "DeniedNetworkAccess". Include all local administrator accounts as members of the group, including the built-in Administrator account. Do not include domain administrative accounts or groups.

*Windows 8.1 and Windows Server 2012 R2 added new built-in security groups, "Local account" and "Local account and member of Administrators group", for assigning permissions and rights to local accounts.
Microsoft Security Advisory Patch 2871997 adds these groups to Windows 7, Windows 8, Windows Server 2008 R2, and Windows Server 2012.
Use these groups instead of creating a group for local administrator accounts to apply to deny rights where required. Assign the group "Local account and member of Administrators group" or the more restrictive "Local account".