Skip to main content
CUI

Recommended Mappings - POAM-00198

POAM-00198 V-224997: The Access this computer from the network user right must only be assigned to the Administrators, Au

The Access this computer from the network user right must only be assigned to the Administrators, Authenticated Users, and Enterprise Domain Controllers groups on domain controllers....

Recommended NIST Controls

Based on keyword analysis of POA&M description

Control Title Family Action
No recommendations available (ingest NIST controls first)

Recommended STIG Rules

Based on keyword analysis of POA&M description

Vuln ID Title Severity Action
V-224819 Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks. CAT I
V-224820 Passwords for the built-in Administrator account must be changed at least every 60 days. CAT II
V-224821 Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email. CAT I
V-224822 Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks. CAT II
V-224824 Manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization. CAT II
V-224825 Shared user accounts must not be permitted on the system. CAT II
V-224826 Windows Server 2016 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs. CAT II
V-224829 The Windows Server 2016 system must use an anti-virus program. CAT I
V-224831 Local volumes must use a format that supports NTFS attributes. CAT I
V-224832 Permissions for the system drive root directory (usually C:\) must conform to minimum requirements. CAT II
CUI