[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-96592-1

Platform: cpe:/o:microsoft:windows_11Date: (C)2022-05-07   (M)2023-07-04



This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. The options are: - Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. - Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. Countermeasure: Enable the User Account Control: Admin Approval Mode for the Built-in Administrator account setting if you have the built-in Administrator account enabled. Potential Impact: Users that log on using the local Administrator account will be prompted for consent whenever a program requests an elevation in privilege.


Parameter:

[enabled/disabled]


Technical Mechanism:

(1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Admin Approval Mode for the Built-in Administrator account (2) REG: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System!FilterAdministratorToken

CCSS Severity:CCSS Metrics:
CCSS Score : 6.7Attack Vector: LOCAL
Exploit Score: 0.8Attack Complexity: LOW
Impact Score: 5.9Privileges Required: HIGH
Severity: MEDIUMUser Interaction: NONE
Vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:79480


OVAL    1
oval:org.secpod.oval:def:79480
XCCDF    2
xccdf_org.secpod_benchmark_general_Windows_11
xccdf_org.secpod_benchmark_NIST_800_53_r5_Windows_11

© SecPod Technologies