DM0924: SQL Server service account - 'SQL Service Account != LocalSystem, Local Service or Network Service'

Information

ref: DISA DB STIG SQL 2005 V8
ref: Vulnerability Key: V0003835
ref: STIG ID: DM0924-SQLServer9
ref: Severity: Category II
The SQL Server service should use a least-privileged local or domain user account.
The Windows builtin Administrators group and LocalSystem account are assigned full privileges to the Windows operating system. These
privileges are not required by the SQL Server service accounts for operation and, if assigned, could allow a successful attack of the SQL
Server service to lead to a full compromise of the host system.
ref: U_INS_sqlserver9_v8r1.7_Checklist_20100827.pdf pg. 174