WINRG-000003 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges.

Information

A compromised local administrator account can provide means for an attacker to move laterally between domain systems.

With User Account Control enabled, filtering the privileged token for local administrator accounts will prevent the elevated privileges of these accounts from being used over the network.

Solution

Configure the following registry value-

Registry Hive- HKEY_LOCAL_MACHINE
Subkey- SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

Value Name- LocalAccountTokenFilterPolicy

Type- REG_DWORD
Value- 0

See Also

http://iasecontent.disa.mil/stigs/zip/Oct2016/U_Windows_Vista_V6R41_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-3, CAT|II, CCI|CCI-001084, Rule-ID|SV-47845r2_rule, STIG-ID|WINRG-000003, Vuln-ID|V-36439

Plugin: Windows

Control ID: 7f5883866e963af86aa2ad2701d70c75259947f7ee86d05f9c858fbf20724a2c