WN12-SO-000004 - Local accounts with blank passwords must be restricted to prevent access from the network.

Information

An account without a password can allow unauthorized access to a system as only the username would be required. Password policies should prevent accounts with blank passwords from existing on a system. However, if a local account with a blank password did exist, enabling this setting will prevent network access, limiting the account to local console logon only.

Solution

Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'Accounts: Limit local account use of blank passwords to console logon only' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_MS_V3R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-225449r569185_rule, STIG-ID|WN12-SO-000004, STIG-Legacy|SV-52886, STIG-Legacy|V-3344, Vuln-ID|V-225449

Plugin: Windows

Control ID: 1b617146b10b5fb791e8d3624d2b7c9624f47c167d80b4afe517e46fb8856c71