Ensure No Auditing for 'Audit Policy: Object Access: Kernel Object'
|ID: oval:org.secpod.oval:def:35510||Date: (C)2016-06-10 (M)2017-10-18|
|Class: COMPLIANCE||Family: windows|
This subcategory reports when kernel objects such as processes and mutexes are accessed. Only kernel objects with SACLs cause audit events to be generated, and only when they are accessed in a manner matching their SACL. Typically kernel objects are only given SACLs if the AuditBaseObjects or AuditBaseDirectories auditing options are enabled.
Refer to the Microsoft Knowledgebase article 'Description of security events in Windows Vista and in Windows Server 2008' for the most recent information about this setting: http://support.microsoft.com/kb/947226.
|Microsoft Windows 10|