User Account Policies

User Account Policies
Here is a checklist of User Account Policies to check the requirements for requesting and maintaining an account on computer systems or networks, typically within an organization.

Sub Category Checklist Threat
Password Based Vulnerability– Weak Password Management Check if Windows Password is Empty Unauthorized access
Check if Account Lockout is Enabled Unauthorized access
Check if Password Required is True Unauthorized access
Check if Password Expires is set to True (Password Aging) Unauthorized access
Check if the Password is strong Open to hacking
Make sure users are aware of the confidentiality of passwords or any other important data. Sharing of passwords or any other confidential data can cause data loss. Unauthorized access
Password Based Vulnerability– Account based Vulnerabilities Check if more than one user has admin privilege Unauthorized use of admin privilege.
Check if Guest account is enabled Unauthorized access
Check group policy and identify unauthorized users in each group Any Unauthorized person having Admin privilege can create vulnerabilities.
Check if UAC is enabled Unauthorized access.
Check if service accounts are disabled. Unauthorized access to service account is vulnerability.
Check permissions levels of each user and verify that unauthorized access is not present Access to system files or other user’s confidential data.
Check for inactive or unused accounts Vulnerable to unauthorized access
Check if auto account log out after a specific interval of idle time, is enabled and properly configured. Vulnerable to unauthorized access.
Password Based Vulnerability– Shared Folder with Write Permission Check if shared folders are having write permission for non-Administrator Users Virus attack from other infected Network devices
Check who has access to shared folders Unauthorized access
Check permissions of each user to a shared folder Unauthorized access.
Check for password protected sharing, public folder sharing, Encryption methods and Home Group access in advanced network sharing Unauthorized access.
Password Based Vulnerability– Domain User Vulnerabilities Check the Domain user type. User with Admin privilege can cause issues.
Check group policies of domain user Any user having access to unauthorized application can cause vulnerability.
Check the scope of non-Administrator Users (Both local and network level) Unauthorized access.
Check inactive or unused user accounts Unauthorized access.
Check password policy Unauthorized access.
Check Permission of each user Unauthorized access to data
Check network Access. Allow anonymous SID/Name translation [Disabled] Unauthorized access
Check if any inactive accounts present in the domain. currently: Users who are currently not working with the enterprise. Make sure to disable these accounts. Unauthorized access