Free Alerts and Reports: 8.1.2: Management of User IDs


Control addition, deletion, and modification of user ID, credentials and other identifier objects




 









Action1 Customers
8.1.2: Management of User IDs   Control addition, deletion, and modification of user ID, credentials and other identifier objects


This Action1 query lists all local user accounts created, deleted or modified, all changes in user rights assignments, changes in data access permissions as well as new user profiles created when new users login on the endpoints. The goal is to ensure that user accounts granted access to systems are all valid and recognized users and an organization enforces strict processes to manage user identities.

Sign-up for Action1 Free Edition to streamline compliance efforts for your network of endpoints. Such as you can simplify assessments of 8.1.2: Management of User IDs for your internal or external auditors, create instant or regular compliance reports that prove your compliance while reducing the costs. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints within seconds and allows you to pass compliance audits and maintain continuous compliance with ease.



 



Respond to Threatsin Real-Time

Ask questions in plain English such as "list of installed software" or "all running processes".
Get answers instantly from live systems or subscribe to real-time alerts.


8.1.2: Management of User IDs
 




Related Alerts and Reports:

8.1.1: Assign Unique User IDs
    All users must be assigned a unique ID before granting them access to cardholder data
8.1.3: Revoke Access for Terminated Employees
    Ensure that any terminated users lose their access to corporate systems
8.1.4: Inactive User Accounts
    Remove or disable user accounts that have been inactive for over 90 days
8.1.5: Third Party Accounts
    Enable third-party vendor accounts only when needed and monitor when in use
8.1.6: Account Lockouts
    Limit multiple invalid login attempts by locking out the user ID after 6 attempts
8.1.7: Account Lockout Duration
    The lockout duration must be at least 30 minutes or until re-enabled by administrator
8.1.8: Idle Sessions
    Require user re-authentication after a session has been idle for more than 15 minutes


Keywords: Control addition, deletion, and modification of user ID, credentials and other identifier objects,Action1 8.1.2: Management of User IDs.

Find more information on 8.1.2: Management of User IDs at Microsoft TechNet.