[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Audit Policy: Audit account logon events

ID: oval:org.secpod.oval:def:14845Date: (C)2013-08-20   (M)2022-10-10
Class: COMPLIANCEFamily: windows




Auditing of Audit account logon events on failure should be enabled or disabled as appropriate. This security setting determines whether to audit each instance of a user logging on to or logging off from another computer in which this computer is used to validate the account. Account logon events are generated when a domain user account is authenticated on a domain controller. The event is logged in the domain controller's security log. Logon events are generated when a local user is authenticated on a local computer. The event is logged in the local security log. Account logoff events are not generated. If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry when an account logon attempt succeeds. Failure audits generate an audit entry when an account logon attempt fails. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit account logon events (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10689-8
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10689-8

© SecPod Technologies