[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Audit Policy: Account Logon: Other Account Logon Events

ID: oval:org.secpod.oval:def:18888Date: (C)2014-05-29   (M)2021-06-02
Class: COMPLIANCEFamily: windows




Auditing of Account Logon: Other Account Logon Events events on failure should be enabled or disabled as appropriate. Audit Other Account Logon Events, which allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. Examples can include the following: * Remote Desktop session disconnections * New Remote Desktop sessions * Locking and unlocking a workstation * Invoking a screen saver * Dismissing a screen saver * Detection of a Kerberos replay attack, in which a Kerberos request with identical information was received twice * Access to a wireless network granted to a user or computer account * Access to a wired 802.1x network granted to a user or computer account Fix: (1) GPO: Commandline: auditpol.exe (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10755-7
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10755-7

© SecPod Technologies