Logon-Logoff: Audit Logon
|ID: oval:gov.nist.usgcb.windowsseven:def:175||Date: (C)2012-04-13 (M)2017-10-21|
|Class: COMPLIANCE||Family: windows|
This policy setting allows you to audit events generated by user account logon attempts on the computer.
Events in this subcategory are related to the creation of logon sessions and occur on the computer which was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. The following events are included:
Successful logon attempts.
Failed logon attempts.
Logon attempts using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account's credentials. This most commonly occurs in batch logon configurations, such as scheduled tasks or when using the RUNAS command.
Security identifiers (SIDs) were filtered and not allowed to log on.
Volume: Low on a client computer. Medium on a domain controller or a network server
Default on Client edtions: Success.
Default on Server editions: Success, Failure.
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies\Logon-Logoff\Audit Logon
(2) REG: INFO NOT AVAILABLE
|Microsoft Windows 7|