[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Audit Policy: Account Logon: Credential Validation

ID: oval:org.secpod.oval:def:22996Date: (C)2015-01-07   (M)2023-07-31
Class: COMPLIANCEFamily: windows




This subcategory reports the results of validation tests on credentials submitted for a user account logon request. These events occur on the computer that is authoritative for the credentials. For domain accounts, the domain controller is authoritative, whereas for local accounts, the local computer is authoritative. In domain environments, most of the Account Logon events occur in the Security log of the domain controllers that are authoritative for the domain accounts. However, these events can occur on other computers in the organization when local accounts are used to log on. Events for this subcategory include: ? 4774: An account was mapped for logon. ? 4775: An account could not be mapped for logon. ? 4776: The domain controller attempted to validate the credentials for an account. ? 4777: The domain controller failed to validate the credentials for an account. Refer to the Microsoft Knowledgebase article ?Description of security events in Windows Vista and in Windows Server 2008? for the most recent information about this setting: http://support.microsoft.com/default.aspx/kb/947226. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Logon!The Account Logon audit category generates events for credential validation. These events occur on the computer that is authoritative for the credentials. (2) REG: NO REGISTRY INFO

Platform:
Microsoft Windows Server 2012 R2
Reference:
CCE-37741-6
CPE    1
cpe:/o:microsoft:windows_server_2012::r2:x64
CCE    1
CCE-37741-6
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2012_R2

© SecPod Technologies