20.40 Ensure 'Only Administrators have Administrator rights on the system' (STIG MS only)

Information

This policy setting ensures that only authorized Administrators responsible for the system have administrator rights.

The STIG recommended state for this setting is: Authorized Administrators

Rationale:

A standard user account should not have administrator rights on a system. Having these rights could allow the account if compromised, to bypass or modify required security restrictions on that machine.

Impact:

Standard user accounts must not be members of the domain and built-in Administrators group.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Remove any unauthorized or standard user accounts from the Administrators group.

Stand-alone system

Open Local Users and Groups

Navigate to Groups

Review the Administrators group for unauthorized accounts or standard user accounts that should not have administrator privileges.

Remove any unauthorized or standard user accounts.



Domain-joined system

Open Active Directory Users and Computers

Review the Administrators and Domain Admins groups (which must be replaced with a domain member server administrator group) group for unauthorized accounts or standard user accounts that should not have administrator privileges.

Remove any unauthorized or standard user accounts.

Default Value:

N/A

Additional Information:

Microsoft Windows Server 2016 Security Technical Implementation Guide:

Version 2, Release 2, Benchmark Date: May 04, 2021



Vul ID: V-225007

Rule ID: SV-225007r569186_rule

STIG ID: WN16-MS-000010

Severity: CAT I

See Also

https://workbench.cisecurity.org/files/3476