InformationThis policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application.
The recommended state for this setting is: Disabled.
Users could see the list of administrator accounts, making it slightly easier for a malicious user who has logged onto a console session to try to crack the passwords of those accounts.
SolutionTo establish the recommended configuration via GP, set the following UI path to Disabled:
Computer Configuration\Policies\Administrative Templates\Windows Components\Credential User Interface\Enumerate administrator accounts on elevation
Note: This Group Policy path is provided by the Group Policy template CredUI.admx/adml that is included with all versions of the Microsoft Windows Administrative Templates.
None - this is the default behavior.
Disabled. (Users will be required to always type in a username and password to elevate.)