Windows Server 2025 must have the built-in guest account disabled.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-278195 | WN25-SO-000010 | SV-278195r1181291_rule | CCI-000804 | medium |
| Description | ||||
| A system faces an increased vulnerability threat if the built-in guest account is not disabled. This is a known account that exists on all Windows systems and cannot be deleted. This account is initialized during the installation of the operating system with no password assigned. | ||||
| STIG | Date | |||
| Microsoft Windows Server 2025 Security Technical Implementation Guide | 2026-02-20 | |||
Details
Check Text (C-278195r1181291_chk)
Verify the effective setting in Local Group Policy Editor.
Run gpedit.msc.
Navigate to Local Computer Policy >> Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options.
If the value for "Accounts: Guest account status" is not set to "Disabled", this is a finding.
For server core installations, run the following command:
Secedit /Export /Areas SecurityPolicy /CFG C:\Path\FileName.Txt
If "EnableGuestAccount" equals "1" in the file, this is a finding.
Fix Text (F-82630r1181290_fix)
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Accounts: Guest account status to "Disabled".