[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Audit Policy: Object Access: Filtering Platform Packet Drop

ID: oval:org.secpod.oval:def:18858Date: (C)2014-05-29   (M)2021-06-02
Class: COMPLIANCEFamily: windows




Auditing of Object Access: Filtering Platform Packet Drop events on success should be enabled or disabled as appropriate. This policy setting determines whether the operating system generates audit events when packets are dropped by the Windows Filtering Platform. Windows Filtering Platform (WFP) was introduced in Windows Server 2008 and Windows Vista to enable independent software vendors (ISVs) to filter and modify TCP/IP packets, monitor or authorize connections, filter Internet Protocol security (IPsec)-protected traffic, and filter remote procedure calls (RPCs). A high rate of dropped packets may indicate that there have been attempts to gain unauthorized access to computers on your network. Fix: (1) GPO: Commandline: auditpol.exe (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10677-3
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10677-3

© SecPod Technologies