Check: SCOM-IA-000002
Microsoft SCOM STIG:
SCOM-IA-000002
(in version v1 r1)
Title
The Microsoft SCOM server must use an active directory group that contains authorized members of the SCOM Administrators Role Group. (Cat II impact)
Discussion
During the initial installation, SCOM grants the Builtin\Administrators group administrator rights to the application. This configuration will allow any local administrator to the SCOM server to have full administrative rights into SCOM.
Check Content
Open the Operations Console and select the Administrative workspace. In the left pane, expand Security and select User Roles. In the center pane, double-click on Operations Manager Administrators. If Builtin\Administrators is listed, this is a finding.
Fix Text
From Active Directory Users and Computers, create a group following the organizational naming standards for SCOM Administrators. Add the SCOM service accounts to this group along with any user's administrative account that is required to administer SCOM. Make note of the group name. Log on to the SCOM console with an administrative account. Select the Administration workspace. Expand Security and click User Roles. From the center pane, double-click on Operations Manager Administrators. Click the Add button and type the name of the group created above and click Check Names. The name should validate. Click OK. The new group should now be added to the Operations Manager Administrators role. Click on Builtin\Administrators and click Remove. Click OK.
Additional Identifiers
Rule ID: SV-237436r643954_rule
Vulnerability ID: V-237436
Group Title: SRG-APP-000080-NDM-000345
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002041 |
The information system allows the use of a temporary password for system logons with an immediate change to a permanent password. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |