Windows Server 2019 must have the built-in guest account disabled.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-205709 | WN19-SO-000010 | SV-205709r958504_rule | CCI-000804 | medium |
| Description | ||||
| A system faces an increased vulnerability threat if the built-in guest account is not disabled. This is a known account that exists on all Windows systems and cannot be deleted. This account is initialized during the installation of the operating system with no password assigned. | ||||
| STIG | Date | |||
| Microsoft Windows Server 2019 Security Technical Implementation Guide | 2025-05-23 | |||
Details
Check Text (C-205709r958504_chk)
Verify the effective setting in Local Group Policy Editor.
Run "gpedit.msc".
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options.
If the value for "Accounts: Guest account status" is not set to "Disabled", this is a finding.
For server core installations, run the following command:
Secedit /Export /Areas SecurityPolicy /CFG C:\Path\FileName.Txt
If "EnableGuestAccount" equals "1" in the file, this is a finding.
Fix Text (F-5974r355046_fix)
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> "Accounts: Guest account status" to "Disabled".