Accounts: Limit local account use of blank passwords to console logon only

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Object Access » Accounts: Limit local account use of blank passwords to console logon only

What is 'Accounts: Limit local account use of blank passwords to console logon only' setting?

This security setting is used to limit the logon activity of a local account with a blank password. When enabled, this setting allows local accounts with blank passwords to login through the local computer alone. It prevents remote logons, Telnet and FTP services for the particular local accounts. User accounts with blank passwords is a security risk, as anyone who knows the username of the account can login to the system and access data. It is recommended that this setting is enabled if the computer is in not in a physically secure area.

This setting can be accessed by navigating to Local Security Policy > Security Settings > Local Policies > Security Options > Accounts: Limit local use account use of blank passwords to console logon only.

About ADAudit Plus:

ADAudit Plus is a real time change auditing software that helps keep your Active Directory, Azure AD, Windows file servers, NetApp filers, EMC file systems, Synology file systems, Windows member servers, and workstations secure and compliant. With ADAudit Plus, you can get visibility into:

  • Authorized and unauthorized AD management changes
  • User logons, logoffs, and account lockouts
  • GPO changes
  • Group attribute and membership changes
  • OU changes
  • Privileged access and permission changes
  • Azure AD logons, and changes to roles, groups, and applications
  • PowerShell scripts and modules

among other things.

There are more than 200 event-specific reports, and you can configure instant email alerts. You can also export the reports to XLS, HTML, PDF and CSV formats to assist in interpretation and forensics. For more information on ADAudit Plus, visit: https://www.manageengine.com/active-directory-audit/.