[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Audit Policy: Audit directory service access

ID: oval:org.secpod.oval:def:18757Date: (C)2014-05-29   (M)2021-06-02
Class: COMPLIANCEFamily: windows




Auditing of Audit directory service access events on success should be enabled or disabled as appropriate. This security setting determines whether to audit the event of a user accessing an Active Directory object that has its own system access control list (SACL) specified. By default, this value is set to no auditing in the Default Domain Controller Group Policy object (GPO), and it remains undefined for workstations and servers where it has no meaning. If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry when a user successfully accesses an Active Directory object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an Active Directory object that has a SACL specified. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit directory service access (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10209-5
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10209-5

© SecPod Technologies