[Forgot Password]
Login  Register Subscribe












Paid content will be excluded from the download.

Download | Alert*
view XML


Platform: win2016Date: (C)2017-08-03   (M)2019-05-13

"Specify the maximum log file size (KB) (Security Log)" This policy setting specifies the maximum size of the log file in kilobytes. If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. Vulnerability: If events are not recorded it may be difficult or impossible to determine the root cause of system problems or the unauthorized activities of malicious users Counter Measure: Enable this policy setting and select "81920." Potential Impact: When event logs fill to capacity, they will stop recording information unless the retention method for each is set so that the computer will overwrite the oldest entries with the most recent ones. To mitigate the risk of loss of recent data, you can configure the retention method so that older events are overwritten as needed. The consequence of this configuration is that older events will be removed from the logs. Attackers can take advantage of such a configuration, because they can generate a large number of extraneous events to overwrite any evidence of their attack. These risks can be somewhat reduced if you automate the archival and backup of event log data. Ideally, all specifically monitored events should be sent to a server that uses Microsoft Operations Manager (MOM) or some other automated monitoring tool. Such a configuration is particularly important because an attacker who successfully compromises a server could clear the Security log. If all events are sent to a monitoring server, then you will be able to gather forensic information about the attacker's activities.


Technical Mechanism: Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Event Log Service\Security (2) REG: No Registry Info


Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:40253

OVAL    1
XCCDF    5

© SecPod Technologies