3.6 Ensure the SQL Server's SQLAgent Service Account is Not an Administrator

Information

The service account and/or service SID used by the SQLSERVERAGENT service for a default instance or SQLAGENT$

<InstanceName>

service for a named instance should not be a member of the Windows Administrator group either directly or indirectly (via a group). This also means that the account known as LocalSystem (AKA NT AUTHORITY\SYSTEM ) should not be used for the SQLAGENT service as this account has higher privileges than the SQL Server service requires.

Following the principle of least privilege, the service account should have no more privileges than required to do its job. For SQL Server services, the SQL Server Setup will assign the required permissions directly to the service SID No additional permissions or privileges should be necessary.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

In the case where LocalSystem is used, use SQL Server Configuration Manager to change to a less privileged account. Otherwise, remove the account or service SID from the Administrators group. You may need to run the SQL Server Configuration Manager if underlying permissions had been changed or if SQL Server Configuration Manager was not originally used to set the service account.

Impact:

The SQL Server Configuration Manager tool should always be used to change the SQL Server's service account. This will ensure that the account has the necessary privileges. If the service needs access to resources other than the standard Microsoft-defined directories and registry, then additional permissions may need to be granted separately to those resources.

If using the auto restart feature, then the SQLAGENT service must be an Administrator.

See Also

https://workbench.cisecurity.org/benchmarks/14058