Skip to main content
CUI

STIG Rule - V-205844

V-205844

SV-205844r991589_rule

CAT I

Windows Server 2019 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.

From: Microsoft Windows Server 2019 Security Technical Implementation Guide (V3R8)

Description

<VulnDiscussion>Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Verify each user with administrative privileges has been assigned a unique administrative account separate from their standard user account. If users with administrative privileges do not have separate accounts for administrative functions and standard user functions, this is a finding.

Fix Text

Ensure each user with administrative privileges has a separate account for user duties and one for privileged duties.

CCI Reference

CCI-000366
Created
2026-04-07 20:08:25
Last Updated
2026-04-07 20:08:25
CUI