Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-36659 | WN12-00-000005 | SV-51576r1_rule | ECLP-1 | High |
Description |
---|
Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges. |
STIG | Date |
---|---|
Windows Server 2012 / 2012 R2 Domain Controller Security Technical Implementation Guide | 2016-12-19 |
Check Text ( C-46839r2_chk ) |
---|
Verify each user with administrative privileges has been assigned a unique administrative account separate from their standard user account. If users with administrative privileges do not have separate accounts for administrative functions and standard user functions, this is a finding. |
Fix Text (F-44705r1_fix) |
---|
Ensure each user with administrative privileges has a separate account for user duties and one for privileged duties. |