822e9bf2-405a-42cb-9566-8532df68939f
It is best practice that the local Administrator account is disabled due to several known vulnerabilities:
All other accounts that are members of the Administrator's group have the safeguard of locking out the account if the number of failed logins exceeds its configured maximum.
To fix this configure the policy value for
Computer Configuration
|_ Windows Settings
|_ Security Settings
|_ Local Policies
|_ Security Options
|_ Accounts: Administrator account status to "Disabled".
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status
https://www.technipages.com/windows-administrator-account-login-screen
Desktop:
W11: https://www.stigviewer.com/stig/microsoft_windows_11/2022-06-24/finding/V-253432
W10: https://www.stigviewer.com/stig/windows_10/2019-01-04/finding/V-63619 / https://www.stigviewer.com/stig/windows_10/2021-08-18/finding/V-220908
CIS CSC v6: 5.1,16,16.8
NIST 800-53: IA-2,
DISA CAT: II
CCI: CCI-000764
Stif Rule-ID: SV-220908r569187_rule,
STIG-ID: WN10-SO-000005,
STIG-Legacy: SV-78091, V-63601
Vuln-ID: V-63619, V-220908