This policy setting determines which users or processes can generate audit records in the Security log.
When configuring a user right in the SCM enter a comma delimited list of accounts. Accounts can be either local or located in Active Directory, they can be groups, users, or computers.
Vulnerability:
An attacker could use this capability to create a large number of audited events, which would make it more difficult for a system administrator to locate any illicit activity. Also, if the event log is configured to overwrite events as needed, any evidence of unauthorized activities could be overwritten by a large number of unrelated events.
Counter Measure:
Ensure that only the Service and Network Service accounts have the Generate security audits user right assigned to them.
Potential Impact:
None. This is the default configuration.
Fix:
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Generate security audits
(2) REG: NO INFO
[default]
(1) GPO: Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment\\Generate security audits
(2) REG: NO INFO
oval:org.secpod.oval:def:40227
SCAP Repo OVAL Definition
2017-04-25