[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Audit Policy: Logon-Logoff: IPsec Main Mode

ID: oval:org.secpod.oval:def:18973Date: (C)2014-05-29   (M)2021-06-02
Class: COMPLIANCEFamily: windows




Auditing of Logon-Logoff: IPsec Main Mode events on success should be enabled or disabled as appropriate. This subcategory reports the results of Internet Key Exchange (IKE) protocol and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. Events for this subcategory include: - 4646: IKE DoS-prevention mode started. - 4650: An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication was not used. - 4651: An IPsec Main Mode security association was established. Extended Mode was not enabled. A certificate was used for authentication. - 4652: An IPsec Main Mode negotiation failed. - 4653: An IPsec Main Mode negotiation failed. - 4655: An IPsec Main Mode security association ended. - 4976: During Main Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. - 5049: An IPsec Security Association was deleted. - 5453: An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started. Refer to the Microsoft Knowledgebase article Description of security events in Windows Vista and in Windows Server 2008 for the most recent information about this setting: http://support.microsoft.com/default.aspx/kb/947226. Fix: (1) GPO: Commandline: auditpol.exe (2) REG: NO INFO

Platform:
Microsoft Windows Server 2008 R2
Reference:
CCE-10948-8
CPE    1
cpe:/o:microsoft:windows_server_2008:r2
CCE    1
CCE-10948-8

© SecPod Technologies