Check: WN10-SO-000280
Microsoft Windows 10 STIG:
WN10-SO-000280
(in versions v2 r5 through v1 r21)
Title
Passwords for enabled local Administrator accounts must be changed at least every 60 days. (Cat II impact)
Discussion
The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the password. A local Administrator account is not generally used and its password not may be changed as frequently as necessary. Changing the password for enabled Administrator accounts on a regular basis will limit its exposure. It is highly recommended to use Microsoft's Local Administrator Password Solution (LAPS). Domain-joined systems can configure this to occur more frequently. LAPS will change the password every "30" days by default. The AO still has the overall authority to use another equivalent capability to accomplish the check.
Check Content
Review the password last set date for the enabled local Administrator account. On the local domain joined workstation: Open "PowerShell". Enter "Get-LocalUser –Name * | Select-Object *” If the "PasswordLastSet" date is greater than "60" days old for the local Administrator account for administering the computer/domain, this is a finding.
Fix Text
Change the enabled local Administrator account password at least every "60" days. It is highly recommended to use Microsoft's LAPS, which may be used on domain-joined member servers to meet this requirement. The AO still has the overall authority to use another equivalent capability to accomplish the check.
Additional Identifiers
Rule ID: SV-220952r793301_rule
Vulnerability ID: V-220952
Group Title: SRG-OS-000076-GPOS-00044
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000199 |
The information system enforces maximum password lifetime restrictions. |
Controls
Number | Title |
---|---|
IA-5(1) |
Password-based Authentication |