UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Active Directory Group Policy objects must be configured with proper audit settings.


Overview

Finding ID Version Rule ID IA Controls Severity
V-39325 WINAU-000207-DC SV-55017r1_rule ECAR-1 ECAR-2 ECAR-3 Medium
Description
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact of missing audit data is related to the type of object. A failure to capture audit data for objects used by identification, authentication, or authorization functions could degrade or eliminate the ability to track changes to access policy for systems or data. For Active Directory (AD), there are a number of critical object types in the domain naming context of the AD database for which auditing is essential. This includes Group Policy objects. Because changes to these objects can significantly impact access controls or the availability of systems, the absence of auditing data makes it impossible to identify the source of changes that impact the confidentiality, integrity, and availability of data and systems throughout an AD domain. The lack of proper auditing can result in insufficient forensic evidence needed to investigate an incident and prosecute the intruder.
STIG Date
Windows 2003 Domain Controller Security Technical Implementation Guide 2014-04-02

Details

Check Text ( C-48741r1_chk )
Verify the auditing configuration for group policy objects.

Use of the Group Policy Management console is recommended. If it is not installed on a system, group policies must be identified and auditing verified using Active Directory Sites and Services (dssite.msc) and Active Directory Users and Computers (dsa.msc).

Open "Group Policy Management". (Available from various menus or run "gpmc.msc".)
Navigate to "Group Policy Objects" in the domain being reviewed (Forest > Domains > Domain).

For each Group Policy object:
Select the Group Policy Object item in the left pane.
Select the Delegation tab in the right pane.
Select the Advanced button.
Select the Advanced button again and then the Auditing tab.

If the audit settings for any Group Policy object are not at least as inclusive as those below, this is a finding.

Type - Fail
Name - Everyone
Access - Full Control
Inherited From -
Apply to - This object and all child objects

The three Success types listed below are defaults Inherited From the Parent Object. Where Special is listed in the summary screens for Access, detailed Permissions are provided for reference, various Properties selections may also exist by default.

Type - Success
Name - Everyone
Access - Special
Inherited From - Parent Object
Apply to - groupPolicyContainer objects
(Access - Special = Permissions: Write All Properties, Modify Permissions)

Two instances with the following summary information will be listed.
Type - Success
Name - Everyone
Access - Write Property
Inherited From - Parent Object
Apply to - Organization Unit objects
Fix Text (F-47891r1_fix)
Configure the audit settings for Group Policy objects to include the following.

Type - Fail
Name - Everyone
Access - Full Control
Inherited From -
Apply to - This object and all child objects

The three Success types listed below are defaults Inherited From the Parent Object. Where Special is listed in the summary screens for Access, detailed Permissions are provided for reference, various Properties selections may also exist by default.

Type - Success
Name - Everyone
Access - Special
Inherited From - Parent Object
Apply to - groupPolicyContainer objects
(Access - Special = Permissions: Write All Properties, Modify Permissions)

Two instances with the following summary information will be listed.
Type - Success
Name - Everyone
Access - Write Property
Inherited From - Parent Object
Apply to - Organization Unit objects