[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Generate security audits

ID: oval:org.secpod.oval:def:79712Date: (C)2022-05-07   (M)2023-07-04
Class: COMPLIANCEFamily: windows




This security setting determines which accounts can be used by a process to add entries to the security log. The security log is used to trace unauthorized system access. Misuse of this user right can result in the generation of many auditing events, potentially hiding evidence of an attack or causing a denial of service if the Audit: Shut down system immediately if unable to log security audits security policy setting is enabled. For more information see Audit: Shut down system immediately if unable to log security audits Default: Local Service Network Service Counter Measure: Ensure that only the Service and Network Service accounts have the Generate security audits user right assigned to them. Potential Impact: None. This is the default configuration. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Generate security audits (2) REG: ### (3) WMI: root\rsop\computer#RSOP_UserPrivilegeRight#AccountList#UserRight=SeAuditPrivilege and precedence=1

Platform:
Microsoft Windows 11
Reference:
CCE-96939-4
CPE    1
cpe:/o:microsoft:windows_11:21h2::x64
CCE    1
CCE-96939-4
XCCDF    4
xccdf_org.secpod_benchmark_HIPAA_45CFR_164_Windows_11
xccdf_org.secpod_benchmark_general_Windows_11
xccdf_org.secpod_benchmark_NIST_800_53_r5_Windows_11
xccdf_org.secpod_benchmark_NIST_800_171_R2_Windows_11
...

© SecPod Technologies