CIS Microsoft Windows 10 Enterprise Release 1909 Benchmark
2.2.23 (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' (Scored)
ProfileApplicability:
Level 1 (L1) - Corporate/Enterprise Environment (general use)
Description:
This policy setting determines which users or processes can generate audit records in the Security log.
The recommended state for this setting is: LOCAL SERVICE, NETWORK SERVICE .
Note: This user right is considered a "sensitive privilege" for the purposes of auditing.
Rationale:
An attacker could use this capability to create a large number of audited events, which would make it more difficult for a system administrator to locate any illicit activity. Also, if the event log is configured to overwrite events as needed, any evidence of unauthorized activities could be overwritten by a large number of unrelated events.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as prescribed.
Remediation:
To establish the recommended configuration via GP, set the following UI path to LOCAL SERVICE, NETWORK SERVICE :
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Generate security audits
Impact:
On most computers, this is the default configuration and there will be no negative impact. However, if you have installed Web Server (IIS) , you will need to allow the IIS application pool(s) to be granted this user right.
115 | P a g e
Made with FlippingBook - Online magazine maker