Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-28114 | SHPT-00-000315 | SV-37767r2_rule | ECAT-1 ECAT-2 | Medium |
Description |
---|
Without auditing enabled, individual system accesses cannot be tracked and malicious activity cannot be detected and traced back to an individual account. |
STIG | Date |
---|---|
SharePoint 2010 Security Technical Implementation Guide (STIG) | 2015-10-02 |
Check Text ( C-37305r6_chk ) |
---|
The auditing information management policy needs to be configured to available in new site and list policies. This feature makes auditing services available for auditing user actions on documents and list items to the Audit Log. Information in the Audit Log can help in determining accountability. 1. In SharePoint Central Administration, click Security. 2. On the Security page, on the Information policy list, click Configure Information Management Policy. 3. On the Information Management Policy Configuration page, select Auditing. 4. Verify the option Available for use in new site and list policies is selected. 5. Mark this as a finding if the option Available for use in new site and list policies is not set. |
Fix Text (F-32543r6_fix) |
---|
Ensure the auditing information management policy is configured to be available. 1. In SharePoint Central Administration, click Security. 2. On the Security page, in the Information policy list, click Configure Information Management Policy. 3. On the Information Management Policy Configuration page, select Auditing. 4. Select the option Available for use in new site and list policies. 5. Click Save. |