WN12-00-000011 - Windows 2012/2012 R2 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Setting application accounts to expire may cause applications to stop functioning. However, not changing them on a regular basis exposes them to attack. If managed service accounts are used, this alleviates the need to manually change application account passwords.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Change passwords for manually managed application/service accounts at least annually or when an administrator with knowledge of the password leaves the organization.

It is recommended that system-managed service accounts be used where possible.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_MS_V3R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-225248r569185_rule, STIG-ID|WN12-00-000011, STIG-Legacy|SV-51580, STIG-Legacy|V-36662, Vuln-ID|V-225248

Plugin: Windows

Control ID: 2e2321a78d09134cdbc4147756baf131d9405fdbb7e6128ed474c3e175b1e580