User Accounts (sec-users)

Monitors local user accounts, privileges, and group memberships. Detects new accounts, inactive users, and unexpected administrator rights.

Configuration

ParameterTypeDefaultDescription
enabledbooltrueEnable/disable module
inactive_daysint90Days without login before an account is considered inactive
check_authorized_keysbooltrueCheck SSH authorized_keys (Linux only)
allowed_uid0_userslist["root"]Allowed users with UID 0 (Linux only)
allowed_sudo_userslist[]Allowed sudo/wheel members (Linux only)
shadow_checkbooltrueCheck /etc/shadow for empty passwords (Linux only)

YAML Example

sec_users:
  enabled: true
  inactive_days: 60
  check_authorized_keys: true
  allowed_uid0_users:
    - "root"
  allowed_sudo_users:
    - "admin"

Diagnostic Codes

Linux

CodeSeverityMeaningRecommendation
70000No user account issues detected
70011New user createdVerify account
70022User with UID 0 (root privileges)Only root should have UID 0
70032Empty password in /etc/shadowSet a password or lock the account
70041Inactive userDisable or delete the account
70050authorized_keys foundReview SSH keys
70061New member in sudo/wheel groupVerify authorization

Windows

CodeSeverityMeaningRecommendation
80000No user account issues detected
80011New local user detectedVerify account
80021Unexpected member in Administrators groupReview authorization
80031Guest account is enabledDisable guest account
80041Inactive userDisable or delete the account
80051New member in Administrators groupVerify authorization

Platform Support

  • Linux: Reads /etc/passwd, /etc/shadow, /etc/group, and authorized_keys.
  • Windows: Uses net user, net localgroup, and WMI queries.