Skip to main content
CUI

STIG Rule - V-224819

V-224819

SV-224819r991589_rule

CAT I

Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.

From: Microsoft Windows Server 2016 Security Technical Implementation Guide (V2R10)

Description

<VulnDiscussion>Using a privileged account to perform routine functions makes the computer vulnerable to malicious software inadvertently introduced during a session that has been granted full privileges.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Verify each user with administrative privileges has been assigned a unique administrative account separate from their standard user account. If users with administrative privileges do not have separate accounts for administrative functions and standard user functions, this is a finding.

Fix Text

Ensure each user with administrative privileges has a separate account for user duties and one for privileged duties.

CCI Reference

CCI-000366
Created
2026-01-14 17:55:45
Last Updated
2026-01-14 17:55:45
CUI