WN08-00-000005-03 - Policy must require that administrative user accounts not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Using applications that access the internet, or have potential internet sources using administrative privileges, exposes a system to compromise. If a flaw in an application is exploited while running as a privileged user, the entire system could be compromised. Web browsers and email are common attack vectors for introducing malicious code and must not be run with an administrative user account.

Since administrative user accounts may generally change or work around technical restrictions for running a web browser or other applications, it is essential that policy requires administrative users not access the internet or use applications, such as email.

The policy should define specific exceptions for local service administration. These exceptions may include HTTP(S)-based tools that are used for the administration of the local system, services, or attached devices.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Establish a site policy to prohibit the use applications that access the internet, such as web browsers, or with potential internet sources, such as email, by administrative user accounts. Ensure the policy is enforced.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_8_and_8-1_V1R23_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000366, Rule-ID|SV-48277r3_rule, STIG-ID|WN08-00-000005-03, Vuln-ID|V-36660

Plugin: Windows

Control ID: 0b4396ebce2d3941327e43bffcedca98a524a57401c9599e19a90467471e4c81