UCF STIG Viewer Logo

Win7 Audit


Overview

Date Finding Count (40)
2013-06-10 CAT I (High): 0 CAT II (Med): 38 CAT III (Low): 2
STIG Description
The Windows 7 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from DoD consensus, as well as the Windows 7 Security Guide and security templates published by Microsoft Corporation. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil.

Available Profiles



Findings (MAC Audit and Audit Log Checks)

Finding ID Severity Title
V-26580 Medium The Security event log will be configured to a minimum size requirement.
V-14230 Medium Audit policy using subcategories is enabled.
V-26533 Medium The system will be configured to audit "Account Management -> Other Account Management Events" successes.
V-26529 Medium The system will be configured to audit "Account Logon -> Credential Validation" successes.
V-26582 Medium The System event log will be configured to a minimum size requirement.
V-26581 Medium The Setup event log will be configured to a minimum size requirement.
V-26538 Medium The system will be configured to audit "Account Management -> User Account Management" failures.
V-26539 Medium The system will be configured to audit "Detailed Tracking -> Process Creation" successes.
V-26530 Medium The system will be configured to audit "Account Logon -> Credential Validation" failures.
V-26531 Medium The system will be configured to audit "Account Management -> Computer Account Management" successes.
V-26536 Medium The system will be configured to audit "Account Management -> Security Group Management" failures.
V-26537 Medium The system will be configured to audit "Account Management -> User Account Management" successes.
V-26534 Medium The system will be configured to audit "Account Management -> Other Account Management Events" failures.
V-26535 Medium The system will be configured to audit "Account Management -> Security Group Management" successes.
V-26532 Medium The system will be configured to audit "Account Management -> Computer Account Management" failures.
V-26549 Medium The system will be configured to audit "Privilege Use -> Sensitive Privilege Use" successes.
V-26548 Medium The system will be configured to audit "Policy Change -> Authentication Policy Change" successes.
V-26547 Medium The system will be configured to audit "Policy Change -> Audit Policy Change" failures.
V-26546 Medium The system will be configured to audit "Policy Change -> Audit Policy Change" successes.
V-26545 Medium The system will be configured to audit "Object Access -> Registry" failures.
V-26544 Medium The system will be configured to audit "Object Access -> File System" failures.
V-26543 Medium The system will be configured to audit "Logon/Logoff -> Special Logon" successes.
V-26542 Medium The system will be configured to audit "Logon/Logoff -> Logon" failures.
V-26541 Medium The system will be configured to audit "Logon/Logoff -> Logon" successes.
V-26540 Medium The system will be configured to audit "Logon/Logoff -> Logoff" successes.
V-14228 Medium Audit access to global system objects is not turned off.
V-26558 Medium The system will be configured to audit "System -> System Integrity" failures.
V-26554 Medium The system will be configured to audit "System -> Security State Change" failures.
V-14229 Medium Audit of backup and restore privileges is not turned off.
V-26556 Medium The system will be configured to audit "System -> Security System Extension" failures.
V-26557 Medium The system will be configured to audit "System -> System Integrity" successes.
V-26550 Medium The system will be configured to audit "Privilege Use -> Sensitive Privilege Use" failures.
V-26551 Medium The system will be configured to audit "System -> IPSec Driver" successes.
V-26552 Medium The system will be configured to audit "System -> IPSec Driver" failures.
V-26553 Medium The system will be configured to audit "System -> Security State Change" successes.
V-26579 Medium The Application event log will be configured to a minimum size requirement.
V-26489 Medium Unauthorized accounts will not have the "Generate security audits" user right.
V-26555 Medium The system will be configured to audit "System -> Security System Extension" successes.
V-1091 Low System halts once an event log has reached its maximum size.
V-15672 Low Event Viewer events.asp links are available.