Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-1148 | WN12-GE-000013 | SV-52862r1_rule | IAAC-1 | Low |
Description |
---|
To minimize potential points of attack, local users, other than built-in accounts such as Administrator and Guest accounts, must not exist on a workstation in a domain. Users must log onto workstations in a domain with their domain accounts. |
STIG | Date |
---|---|
Windows Server 2012 Domain Controller Security Technical Implementation Guide | 2014-01-07 |
Check Text ( C-47179r2_chk ) |
---|
This requirement is NA for nondomain-joined systems. Run the DUMPSEC utility. Select "Dump Users as Table" from the "Report" menu. Select the following fields, and click "Add" for each entry: UserName SID AcctDisabled Groups If local users other than the built-in accounts listed below exist on a workstation in a domain, this is a finding: Built-in administrator account (SID ending in 500) Built-in guest account (SID ending in 501) If a site has need of special purpose local user accounts, this must be documented with the IAO. |
Fix Text (F-45788r1_fix) |
---|
Configure domain-joined systems to restrict the existence of local user accounts. Remove any unauthorized local accounts. |