WN08-00-000008 - The site must have a contingency for emergency administration of the system.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The built-in administrator account, as a well known account subject to attack, is disabled by default and per STIG requirements. Domain administrative accounts on domain-joined systems should provide sufficient availability for administering a system. A site with limited administrators must ensure they have a contingency for administering a non-domain system.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Create a contingency plan for administering a system. Document any emergency administrator account with the ISSO and store the account information in a secure location.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_8_and_8-1_V1R23_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-48165r2_rule, STIG-ID|WN08-00-000008, Vuln-ID|V-14224

Plugin: Windows

Control ID: 51377f0c5ac490b7d55a95599f87b1cc7029f38bb794e2e073e2d9d8a5f5540f