V-254406
CAT IIWindows Server 2022 Active Directory RID Manager$ object must be configured with proper audit settings.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 0
Check Text
This applies to domain controllers. It is NA for other systems.
Review the auditing configuration for the "RID Manager$" object.
Open "Active Directory Users and Computers" (available from various menus or run "dsa.msc").
Ensure "Advanced Features" is selected in the "View" menu.
Select "System" under the domain being reviewed in the left pane.
Right-click the "RID Manager$" object in the right pane and select "Properties".
Select the "Security" tab.
Select "Advanced" and then the "Auditing" tab.
If the audit settings on the "RID Manager$" object are not at least as inclusive as those below, this is a finding:
Type - Fail
Principal - Everyone
Access - Full Control
Inherited from - None
The success types listed below are defaults. Where Special is listed in the summary screens for Access, detailed Permissions are provided for reference. Various Properties selections may also exist by default.
Type - Success
Principal - Everyone
Access - Special
Inherited from - None
(Access - Special = Write all properties, All extended rights, Change RID master)
Two instances with the following summary information will be listed:
Type - Success
Principal - Everyone
Access - (blank)
Inherited from - (CN of domain)
Fix Text
Open "Active Directory Users and Computers" (available from various menus or run "dsa.msc").
Ensure "Advanced Features" is selected in the "View" menu.
Select "System" under the domain being reviewed in the left pane.
Right-click the "RID Manager$" object in the right pane and select "Properties".
Select the "Security" tab.
Select "Advanced" and then the "Auditing" tab.
Configure the audit settings for RID Manager$ object to include the following:
Type - Fail
Principal - Everyone
Access - Full Control
Inherited from - None
The success types listed below are defaults. Where Special is listed in the summary screens for Access, detailed Permissions are provided for reference. Various Properties selections may also exist by default.
Type - Success
Principal - Everyone
Access - Special
Inherited from - None
(Access - Special = Write all properties, All extended rights, Change RID master)
Two instances with the following summary information will be listed:
Type - Success
Principal - Everyone
Access - (blank)
Inherited from - (CN of domain)
STIG Reference
- STIG
- Microsoft Windows Server 2022 Security Technical Implementation Guide
- Version
- 2
- Release
- 8
- Rule ID
- SV-254406r958732_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| LAB BASELINES | BASELINE | SCHR-P3-DP-001_WinServer2022_V2R7_20260305-133436.cklb | Unassigned | 2026-03-05T13:34:36 | View in Context |