18.8.3.1 (L1) Ensure 'Include command line in process creation events' is set to 'Disabled'

Information

This policy setting determines what information is logged in security audit events when a new process has been created.
The recommended state for this setting is: Disabled.

Rationale:
When this policy setting is enabled, any user who has read access to the security events can read the command-line arguments for any successfully created process. Command-line arguments may contain sensitive or private information such as passwords or user data.

Solution

To establish the recommended configuration via GP, set the following UI path to Disabled:
Computer Configuration\Policies\Administrative Templates\System\Audit Process Creation\Include command line in process creation events
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template AuditSettings.admx/adml that is included with the Microsoft Windows 8.1 & Server 2012 R2 Administrative Templates (or newer).

Impact:
None - this is the default behavior.

Default Value:
Disabled. (The process's command line information will not be included in Audit Process Creation events.)

References:
1. CCE-35802-8

See Also

https://workbench.cisecurity.org/benchmarks/14249

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5, 800-53|IA-5(1), CSCv6|16.14, CSCv7|16.4

Plugin: Windows

Control ID: f538ac11b0fcc4d875cbd6064dbed0fda28d90fee81170c8815aad3aa50f5665