2.2.23 Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This policy setting determines which users or processes can generate audit records in the Security log.

The recommended state for this setting is: 'LOCAL SERVICE, NETWORK SERVICE'.

Note: This user right is considered a 'sensitive privilege' for the purposes of auditing.

Rationale:

An attacker could use this capability to create a large number of audited events, which would make it more difficult for a system administrator to locate any illicit activity.

Also, if the event log is configured to overwrite events as needed, any evidence of unauthorized activities could be overwritten by a large number of unrelated events.

Solution

To establish the recommended configuration via GP, set the following UI path to 'LOCAL SERVICE, NETWORK SERVICE':

Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Generate security audits

Impact:

On most computers, this is the default configuration and there will be no negative impact.

However, if you have installed _Web Server (IIS)_, you will need to allow the IIS application pool(s) to be granted this user right.

See Also

https://workbench.cisecurity.org/files/1933

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(7), CCE|CCE-35363-1, CSCv6|16

Plugin: Windows

Control ID: 0c55a5194504ebbf3f533837cadfa0ec50c8b4ab51f44deaeb56cc52a4017bbc