Skip to main content
CUI

Vulnerability V-259413

Back

V-259413

CAT II

The DNS Name Server software must run with restricted privileges.

Ships Affected
1
Total Findings
1
Open
1
Closed
0

Check Text

Review the account under which the DNS software is running and determine the permissions that account has been assigned. If the account under which the DNS software is running has not been restricted to the least privileged permissions required for the purpose of running the software, this is a finding.

Fix Text

Configure the permissions of the account being used to run the DNS software to have the least privileges required to run the DNS software.

STIG Reference

STIG
Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
Version
2
Release
3
Rule ID
SV-259413r961863_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_WinServerDNS_V2R3_20251023-172313.ckl
Unassigned 2026-01-14T12:57:38.179760 View in Context
CUI