2.1.b: Unnecessary Default Accounts


Verify that all unnecessary default accounts are disable or removed



  

Fully functional free edition for up to 10 endpoints with no expiration date. More details >







Trusted by Thousands of Customers Worldwide:
Action1 Customers
Even if a default account is not intended to be used (such as Guest or Administrator account on Windows systems), changing the default password to a strong unique password and then disabling the account will prevent hackers from re-enabling the account and gaining access with the default password.

This Action1 query automates checking of default accounts to make sure that no default accounts are enabled on the endpoints that are a part of the CDE or have access to the CDE.

Latest Release: Action1 Endpoint Security Platform 2.2, May 4, 2020.
For more information, please refer to Action1 Online Documentation

  

Fully functional free edition for up to 10 endpoints with no expiration date. More details >





Achieve More With Our Integrations and RESTful API


Action1 provides RESTful API and integrates with the following systems so you can get most out of your deployment:

Action1 Integrations




Hundreds of Organizations Worldwide Use Action1 Platform



Midwestern Energy Company

Being a part of the national energy grid infrastructure puts a lot of cybersecurity responsibilities on our company. Action1 helps to implement it.

Midwestern Energy Company

European Construction Conglomerate

Action1 plays a critical role in our cybersecurity strategy. The ability to instantly understand what is happening on your endpoints is priceless.

European Construction Conglomerate

City Government in Georgia

Our city prides on being one of the most digitally transformed cities in the region. Without Action1, the risks of managing the infrastructure were too high.

City Government in Georgia




Related Product Features:

2.1.a: Default Passwords
    Verify that that no endpoint uses vendor-supplied default accounts and passwords
2.1.1.c: Default Passwords for Access Points
    Make sure that endpoints do not use default passwords to connect to wireless access points
2.1.1.d: Strong Encryption for Wireless Connections
    Examine all wireless connections to verify that no weak protocols are used to connect to wireless access points
By continuing to use our website, you agree with our use of cookies in accordance with our Privacy Policy. You can reject cookies by changing your browser settings.     
Ok, got it