Outdated or unused accounts provide penetration points that may go undetected. Inactive accounts must be deleted if no longer necessary or, if still required, disabled until needed.
This will return a list of local accounts with the account name, last logon, and if the account is enabled (True/False). For example: User1 10/31/2015 5:49:56 AM True
Review the list of accounts returned by the above queries to determine the finding validity for each account reported.
Exclude the following accounts: - Built-in administrator account (Renamed, SID ending in 500). - Built-in guest account (Renamed, Disabled, SID ending in 501). - Application accounts.
If any enabled accounts have not been logged on to within the past 35 days, this is a finding.
Inactive accounts that have been reviewed and deemed to be required must be documented with the information system security officer (ISSO).
Fix
Regularly review accounts to determine if they are still active. Remove or disable accounts that have not been used in the last 35 days.