| Hostname | IP Address | Status | Assigned To | Last Scan | Actions |
|---|---|---|---|---|---|
| MONT-AP-002 | 164.231.187.39 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServer2016_Checks) found this to be OPEN on 10/23/2025 ResultHash: 02584B707ED8F7A6BBB550AB8007006439022FB2 ~~~~~ Password for the built-in Administrator account (X_Admin) was last changed on 01/14/2021 03:03:50 (1743 days ago) Comments |
|||||
| MONT-BE-002 | 164.231.187.37 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServer2016_Checks) found this to be OPEN on 10/23/2025 ResultHash: 71A62659BD0BD5A65A87B978C8A286286D2E160D ~~~~~ Password for the built-in Administrator account (X_Admin) was last changed on 03/24/2021 16:46:13 (1673 days ago) Comments |
|||||
| MONT-DB-002 | 164.231.187.38 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServer2016_Checks) found this to be OPEN on 10/23/2025 ResultHash: 02584B707ED8F7A6BBB550AB8007006439022FB2 ~~~~~ Password for the built-in Administrator account (X_Admin) was last changed on 01/14/2021 03:03:50 (1743 days ago) Comments |
|||||
| MONT-DC-003 | 164.231.187.34 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServer2016_Checks) found this to be OPEN on 10/23/2025 ResultHash: F1A30B85277550AD2072CFAC46AEF4298B54F106 ~~~~~ Password for the built-in Administrator account (SHB_Admin) was last changed on 03/24/2021 16:46:13 (1674 days ago) Comments |
|||||
| MONT-DP-001 | 164.231.187.44 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServer2016_Checks) found this to be OPEN on 10/23/2025 ResultHash: 71A62659BD0BD5A65A87B978C8A286286D2E160D ~~~~~ Password for the built-in Administrator account (X_Admin) was last changed on 03/24/2021 16:46:13 (1673 days ago) Comments |
|||||
| MONT-MB-002 | 164.231.187.36 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServer2016_Checks) found this to be OPEN on 10/23/2025 ResultHash: 26572079BCCF907EB437A9106FA6A046FCCE8B31 ~~~~~ Password for the built-in Administrator account (SHB_Admin) was last changed on 03/24/2021 16:46:13 (1673 days ago) Comments |
|||||
| MONT-VSF-003 | 164.231.187.42 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServer2016_Checks) found this to be OPEN on 10/23/2025 ResultHash: 72A6144099867FC3CBCFF6B8E32957D3D3A6873C ~~~~~ Password for the built-in Administrator account (X_Admin) was last changed on 05/12/2023 18:00:29 (894 days ago) Comments |
|||||
| MONT-VSF-004 | 164.231.187.43 | 2026-01-14 | |||
Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServer2016_Checks) found this to be OPEN on 10/23/2025 ResultHash: 257887B5F9AFA7F486067185B8DA4FF4953E63BE ~~~~~ Password for the built-in Administrator account (X_Admin) was last changed on 05/12/2023 18:01:24 (894 days ago) Comments |
|||||
Check Text
Review the password last set date for the built-in Administrator account. Domain controllers: Open "PowerShell". Enter "Get-ADUser -Filter * -Properties SID, PasswordLastSet | Where SID -Like "*-500" | Ft Name, SID, PasswordLastSet". If the "PasswordLastSet" date is greater than "60" days old, this is a finding. Member servers and standalone or nondomain-joined systems: Open "Command Prompt". Enter 'Net User [account name] | Find /i "Password Last Set"', where [account name] is the name of the built-in administrator account. (The name of the built-in Administrator account must be changed to something other than "Administrator" per STIG requirements.) If the "PasswordLastSet" date is greater than "60" days old, this is a finding.
Fix Text
Change the built-in Administrator account password at least every "60" days. It is highly recommended to use Microsoft's LAPS, which may be used on domain-joined member servers to accomplish this. The AO still has the overall authority to use another equivalent capability to accomplish the check.