CCE-9214-8Platform: win7 | Date: (C)2012-05-18 (M)2022-10-10 |
Auditing of 'Audit directory service access' events on failure should be enabled or disabled as appropriate.
Parameter:
enabled/disabled
Technical Mechanism:
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit directory service access
(2) WMI: Namespace = root\rsop\computer; Class = RSOP_AuditPolicy; Property = Success, Failure; Where = Category='AuditDSAccess' and precedence=1
CCSS Severity: | CCSS Metrics: |
CCSS Score : | Attack Vector: |
Exploit Score: | Attack Complexity: |
Impact Score: | Privileges Required: |
Severity: | User Interaction: |
Vector: | Scope: |
| Confidentiality: |
| Integrity: |
| Availability: |
| |
References: Resource Id | Reference |
---|
Old v4 CCE ID | CCE-2390 |
Microsoft Security Compliance Management Toolkit for Windows 7, Version 1.0: "Windows 7 Security Baseline Settings.xlsm" spreadsheet | Worksheet: Audit Policy Settings; Row: 58 |
Microsoft Security Compliance Management Toolkit for Windows 7, Version 1.0: "Windows 7 Security Baseline.xml" | Setting Index #17: This policy setting determines whether to audit user access to an Active Directory object that has its own specified system access control list (SACL). |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:14725 |
BITS Shared Assessments SIG v6.0 | BITS Shared Assessments SIG v6.0 |
Jericho Forum | Jericho Forum |
HIPAA/HITECH Act | HIPAA/HITECH Act |
FedRAMP Security Controls(Final Release Jan 2012)--LOW IMPACT LEVEL-- | FedRAMP Security Controls(Final Release Jan 2012)--LOW IMPACT LEVEL-- |
ISO/IEC 27001-2005 | ISO/IEC 27001-2005 |
COBIT 4.1 | COBIT 4.1 |
GAPP (Aug 2009) | GAPP (Aug 2009) |
NERC CIP | NERC CIP |
NIST SP800-53 R3 | NIST SP800-53 R3 AU-2 |
PCIDSS v2.0 | PCIDSS v2.0 |
FedRAMP Security Controls(Final Release Jan 2012)--MODERATE IMPACT LEVEL-- | FedRAMP Security Controls(Final Release Jan 2012)--MODERATE IMPACT LEVEL-- |
BITS Shared Assessments AUP v5.0 | BITS Shared Assessments AUP v5.0 |