WN19-DC-000070 - Windows Server 2019 permissions on the Active Directory data files must only allow System and Administrators access - Log files path

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Improper access permissions for directory data-related files could allow unauthorized users to read, modify, or delete directory data or audit trails.

Solution

Maintain the permissions on NTDS database and log files as follows:

NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Administrators:(I)(F)

(I) - permission inherited from parent container
(F) - full access

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V2R5_STIG.zip

Item Details

References: CAT|I, CCI|CCI-002235, Rule-ID|SV-205739r852439_rule, STIG-ID|WN19-DC-000070, STIG-Legacy|SV-103117, STIG-Legacy|V-93029, Vuln-ID|V-205739

Plugin: Windows

Control ID: 229cd78a96932cf64f1418dec37f5ad3d21fc0afebfac1882fc4568994d20e09