Microsoft Windows Server 2022 STIG Version Comparison
Microsoft Windows Server 2022 Security Technical Implementation Guide
Comparison
There are 6 differences between versions v1 r3 (June 7, 2023) (the "left" version) and v1 r5 (May 15, 2024) (the "right" version).
Check WN22-00-000020 was changed between these two versions. Green, underlined text was added, red, struck-out text was removed.
The regular view of the left check and right check may be easier to read.
Text Differences
Title
Windows Server 2022 passwords for the built-in Administrator account must be changed at least every 60 days.
Check Content
Review If there are no enabled local Administrator accounts, this is Not Applicable. Review the password last set date for the built-in enabled local Administrator account. Domain account. On controllers: Open the stand alone or domain-joined workstation: Open "PowerShell". Enter "Get-ADUser -Filter "Get-LocalUser -Name * -Properties SID, PasswordLastSet | Select-Object *". If Where SID -Like "*-500" | Ft Name, SID, PasswordLastSet". If the "PasswordLastSet" date is greater than "60" days old, old for the local Administrator account for administering the computer/domain, this is a finding. Member finding. Verify servers LAPS is configured and standalone or nondomain-joined systems: Open "Command Prompt". Enter "Net User [account name] | Find /i operational. Navigate to Local Computer Policy >> Computer Configuration >> Administrative Templates >> System >> LAPS >> "Password Password Last Set"", where [account name] Settings >> Set to enabled. Password Complexity, large letters + small letters + numbers + special, Password Length 14, Password Age 60. If not configured as shown, this is the a finding. Navigate to Local Computer Policy >> Computer Configuration >> Administrative Templates >> System >> LAPS >> Password Settings >> name Name of the built-in administrator account. (The name of the built-in Account to manage >> Set to enabled >> Administrator account name must be changed to something other than "Administrator" per STIG requirements.) If the "PasswordLastSet" date is greater than "60" days old, populated. If it is not, this is a finding. Verify LAPS Operational logs >> Event Viewer >> Applications and Services Logs >> Microsoft >> Windows >> LAPS >> Operational. Verify LAPS policy process is completing. If it is not, this is a finding.
Discussion
The longer a password is in use, the greater the opportunity for someone to gain unauthorized knowledge of the password. The built-in Administrator account is not generally used and its password may not be changed as frequently as necessary. Changing the password for the built-in Administrator account on a regular basis will limit its exposure. Windows LAPS must be used to change the built-in Administrator account password.
Fix
Change the built-in enabled local Administrator account password at least every "60" days. Windows 60 days. Windows LAPS must be used to change the built-in Administrator account password. Domain-joined systems can configure this to occur more frequently. LAPS will change the password every 30 days by default. More information is available default. https://techcommunity.microsoft.com/t5/windows-it-pro-blog/by-popular-demand-windows-laps-available-now/ba-p/3788747 https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview#windows-laps-supported-platforms-and-azure-ad-laps-preview-status at: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/by-popular-demand-windows-laps-available-now/ba-p/3788747 https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview#windows-laps-supported-platforms-and-azure-ad-laps-preview-status