Ensure Audit Success and Failure for 'Privilege Use: Audit Other Privilege Use Events'ID: oval:org.secpod.oval:def:14740 | Date: (C)2013-08-13 (M)2022-10-10 |
Class: COMPLIANCE | Family: windows |
This subcategory reports when a user account or service uses a sensitive privilege.
A sensitive privilege includes the following user rights:
Act as part of the operating system,
Back up files and directories, Create a token object,
Debug programs,
Enable computer and user accounts to be trusted for delegation,
Generate security audits,
Impersonate a client after authentication,
Load and unload device drivers,
Manage auditing and security log,
Modify firmware environment values,
Replace a process-level token,
Restore files and directories, and
Take ownership of files or other objects.
Auditing this subcategory will create a high volume of events. Events for this subcategory include:
- 4672: Special privileges assigned to new logon.
- 4673: A privileged service was called.
- 4674: An operation was attempted on a privileged object.
Refer to the Microsoft Knowledgebase article Description of security events in Windows Vista and in Windows Server 2008 for the most recent information about this setting:
http://support.microsoft.com/default.aspx/kb/947226.
Fix:
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies\Privilege Use\Audit Other Privilege Use Events
(2) REG: INFO NOT AVAILABLE
Platform: |
Microsoft Windows 7 |