20.41 Ensure 'Only administrators responsible for the Domain Controller to have Administrator rights on the system' (STIG DC only)

Information

This policy setting ensures that only administrators responsible for Domain Controllers have Administrator rights on the system.

An account that does not have Administrator duties must not have Administrator rights. Such rights would allow the account to bypass or modify required security restrictions on that machine and make it vulnerable to attack.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Remove any unauthorized or standard user accounts from the Administrators group.

Stand-alone system

- Open

Local Users and Groups

- Select

Groups

and review the Administrators group for unauthorized accounts or standard user accounts that should not have administrator privileges.

Remove any unauthorized or standard user accounts.

Domain-joined system

- Open

Active Directory Users and Computers

and review the Administrators group for unauthorized accounts or standard user accounts that should not have administrator privileges.

Remove any unauthorized or standard user accounts.

Impact:

Only users that administrator rights will have administrator rights.

See Also

https://workbench.cisecurity.org/benchmarks/15301