CCE-43453-0Platform: cpe:/o:microsoft:windows_10 | Date: (C)2016-09-23 (M)2023-07-04 |
Disable: 'User Account Control: Admin Approval Mode for the Built-in Administrator account' for FilterAdministratorToken
This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account.
The options are:
- Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation.
- Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege.
Counter Measure:
Enable the User Account Control: Admin Approval Mode for the Built-in Administrator account setting if you have the built-in Administrator account enabled.
Potential Impact:
Users that log on using the local Administrator account will be prompted for consent whenever a program requests an elevation in privilege.
Parameter:
[enable/disable]
Technical Mechanism:
(1) GPO: Computer ConfigurationWindows SettingsSecurity SettingsLocal PoliciesSecurity OptionsUser Account Control: Admin Approval Mode for the Built-in Administrator account
(2) REG: HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesSystemFilterAdministratorToken
CCSS Severity: | CCSS Metrics: |
CCSS Score : 6.7 | Attack Vector: LOCAL |
Exploit Score: 0.8 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: HIGH |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:35276 |