Showing 1 of 1 findings
(filtered)
View Documentation Status (90 tracked)
| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-259413 | CAT II | MONT-DC-003 | Microsoft Windows Server Domain Name Sys... | The DNS Name Server software must run with restric... | Documented Pending Review | |||
Check TextReview the account under which the DNS software is running and determine the permissions that account has been assigned. If the account under which the DNS software is running has not been restricted to the least privileged permissions required for the purpose of running the software, this is a finding. Fix TextConfigure the permissions of the account being used to run the DNS software to have the least privileges required to run the DNS software. Finding DetailsEvaluate-STIG 1.2507.5 (Scan-WindowsServerDNS_Checks) was unable to determine a Status but found the below configuration on 10/23/2025: ResultHash: 9377041A89A7C9A003652C7FB32E437D88669A67 ~~~~~ Service Name: DNS Server Log on as: LocalSystem
Source: _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_WinServerDNS_V2R3_20251023-172313.ckl
Scan Date: 2026-01-14T12:57:38.179760
Technology Area: Domain Name System
|
||||||||