CCE-99500-1Platform: cpe:/o:microsoft:windows_server_2016 | Date: (C)2023-09-08 (M)2023-10-13 |
This policy allows you to audit the group membership information in the user logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
The recommended state for this setting is to include: Success .
Fix:
(1) GPO: Computer ConfigurationWindows SettingsSecurity SettingsAdvanced Audit Policy ConfigurationAudit PoliciesLogon/LogoffAudit Policy: Logon-Logoff: Group Membership
(2) REG: NO REGISTRY INFO
Parameter:
[success/failure/success_failure/none]
Technical Mechanism:
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Group Membership
CCSS Severity: | CCSS Metrics: |
CCSS Score : 6.7 | Attack Vector: LOCAL |
Exploit Score: 0.8 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: HIGH |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:92717 |