WN12-00-000005 - Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.

Information

Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Ensure each user with administrative privileges has a separate account for user duties and one for privileged duties.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-226031r794370_rule, STIG-ID|WN12-00-000005, STIG-Legacy|SV-51576, STIG-Legacy|V-36659, Vuln-ID|V-226031

Plugin: Windows

Control ID: 665d23b028cbc1c2a38ddf13072399f308e56e0c8b2fce572d4cd964f8f4c2e6