[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Audit Policy: Object Access: SAM

ID: oval:org.secpod.oval:def:18879Date: (C)2014-05-29   (M)2021-06-02
Class: COMPLIANCEFamily: windows




Auditing of Object Access: SAM events on failure should be enabled or disabled as appropriate. The policy setting enables you to audit events that are generated by attempts to access Security Account Manager (SAM) objects. The Security Account Manager (SAM) is a database that is present on computers running Windows operating systems that stores user accounts and security descriptors for users on the local computer. SAM objects include the following: * SAM_ALIAS: A local group * SAM_GROUP: A group that is not a local group * SAM_USER: A user account * SAM_DOMAIN: A domain * SAM_SERVER: A computer account. If you configure this policy setting, an audit event is generated when a SAM object is accessed. Success audits record successful attempts, and failure audits record unsuccessful attempts. Changes to user and group objects are tracked by the Account Management audit category. However, user accounts with enough privileges could potentially alter the files in which the account and password information is stored in the system, bypassing any Account Management events. Fix: (1) GPO: Commandline: auditpol.exe (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10728-4
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10728-4

© SecPod Technologies