Use This Simple Trick to Prevent 94% of Windows Vulnerabilities
By revoking administrator rights from a Windows system you can remediate 94% of vulnerabilities affecting the Windows operating system. Here’s how.
Join our newsletter:
The cybersecurity firm Avecto found that there were 530 Microsoft vulnerabilities reported in 2016, and of these critical vulnerabilities, 94% were found to be mitigated by removing admin rights.
What are Administrator Rights?
Windows Administrator rights give an account the many abilities including the ability to install software, modify settings, modify logs, as well as create and delete user accounts. If an account with administrator rights falls into the hands of a malicious actor then they are in control of your system.
Revoking Administrator Rights
You will always need an account with administrator rights on your machine otherwise you will not be able to install software and make other important changes. With that being said you don’t need every account on your computer to have admin rights. Just have one account with admin rights and use another unprivileged account when using your PC. In case you somehow get malware on your PC while using the unprivileged account the amount of damage it can cause is limited because the account can’t do anything of significance on your PC, unlike an admin account.
How to Revoke Admin Rights
Follow this guide from TechRepublic on How to enable and disable the Administrator account in Windows 10.
Cybersecurity Maturity Model Certification (CMMC) Requirements and Admin Rights
Companies with CMMC level two and higher certification requirements will need to enforce the “principle of least privilege”. As a result they will need to revoke admin rights from accounts that do not have a justified business need. This reserves admin rights to accounts used by your system administrators and others with an authorized operational need. Companies will also have to use separate non privileged and privileged accounts. You can not allow a system administrator to use their admin account when they are performing non-system admin or security functions. You also need to log the execution of privileged functions so that you have a record of the actions your admin accounts have taken. If you would like more information on your cybersecurity maturity model certification (CMMC) related requirements reach out to us at email@example.com.
Discover Our NIST SP 800-171 & CMMC 2.0 Solutions:
Power through compliance. Meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements.
Transform your business. Create new revenue streams and provide scalability for your NIST SP 800-171 and CMMC 2.0 services.
Supply Chain Verifier
Trust is everything. Verify, monitor, and support subcontactor compliance.