| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-243496 | CAT II | MONT-DC-003 | Active Directory Domain Security Technic... | Accounts from outside directories that are not par... | - | |||
Check Text1. Start the Active Directory Users and Computers console (Start, Run, "dsa.msc"). 2. Select and expand the left pane item that matches the name of the domain being reviewed. 3. Select the Built-in container. a. If the Incoming Forest Trust Builders group is defined, double-click on the group, and select the Members tab b. Examine the defined accounts to see if they are from a domain that is not in the forest being reviewed. 4. Select the Users container a. For each group (Domain Admins, Enterprise Admins, Schema Admins, and Group Policy Creator Owners), double-click on the group, and select the Members tab. b. Examine the defined accounts to see if they are from a domain that is not in the forest being reviewed. 5. If any account in a privileged group is from a domain outside the forest being reviewed and that outside forest is not maintained by the same organization (e.g., enclave) or subject to the same security policies, then this is a finding. Supplementary Notes: Note: An account that is from an outside domain appears in the format "outside-domain-NetBIOSname\account" or "account@outside-domain-fully-qualified-name". Examples are "AOFN21\jsmit" or "jsmith@AOFN21.OST.COM". It may be necessary to use the AD Domains and Trusts (domain.msc) console to determine if the domain is from another AD forest. Note: It is possible to move the highly privileged AD security groups out of the AD Users container. If the Domain Admins, Enterprise Admins, Schema Admins, or Group Policy Creator Owners groups are not in the AD Users container, ask the SA for the new location and use that location for this check. Fix TextRemove accounts from outside directories that are not part of the same organization or are not subject to the same security policies from the highly privileged groups. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-ActiveDirectoryDomain_Checks) found this to be NOT A FINDING on 10/23/2025 ResultHash: C6936761C589D356CB5402667B38F66C7EB8DAA0 ~~~~~ 'Incoming Forest Trust Builders' - Contains no members 'Domain Admins' - All members from 'MONTFORD-POINT.navy.mil' forest 'Enterprise Admins' - All members from 'MONTFORD-POINT.navy.mil' forest 'Schema Admins' - All members from 'MONTFORD-POINT.navy.mil' forest 'Group Policy Creator Owners' - All members from 'MONTFORD-POINT.navy.mil' forest
Source: _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_ADDomain_V3R5_20251023-171837.ckl
Scan Date: 2026-01-14T12:57:36.435963
Technology Area: Domain Name System
|
||||||||