WN16-00-000030 - Passwords for the built-in Administrator account must be changed at least every 60 days.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the password. The built-in Administrator account is not generally used and its password not may be changed as frequently as necessary. Changing the password for the built-in Administrator account on a regular basis will limit its exposure.

It is highly recommended to use Microsoft's Local Administrator Password Solution (LAPS). Domain-joined systems can configure this to occur more frequently. LAPS will change the password every '30' days by default. The AO still has the overall authority to use another equivalent capability to accomplish the check.

Solution

Change the built-in Administrator account password at least every '60' days.

It is highly recommended to use Microsoft's LAPS, which may be used on domain-joined member servers to accomplish this. The AO still has the overall authority to use another equivalent capability to accomplish the check.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2016_V2R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000199, Rule-ID|SV-224820r857224_rule, STIG-ID|WN16-00-000030, STIG-Legacy|SV-87875, STIG-Legacy|V-73223, Vuln-ID|V-224820

Plugin: Windows

Control ID: 93b441dafe7153a24316fc5e10b44bab674c20ca40a64b77b7f37abed8c29af8