UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

An Auditors group must be created to restrict access to the Windows Event Logs.


Overview

Finding ID Version Rule ID IA Controls Severity
WN08-GE-000012 WN08-GE-000012 WN08-GE-000012_rule Medium
Description
The Security Event Log contains information on security exceptions that occur on the system. This data is critical for identifying security vulnerabilities and intrusions. The Application and System logs can also contain information that is critical in assessing security events. Therefore, these logs must be protected from unauthorized access and modification. Only individuals who have auditing responsibilities (e.g., IAOs, IAMs, auditors, etc.) must be members of this group.
STIG Date
Windows 8 Security Technical Implementation Guide 2012-11-21

Details

Check Text ( C-WN08-GE-000012_chk )
Interview the SA to determine if an Auditors group for controlling the Windows Event Logs has been created.

NOTE: The administrator(s) responsible for the installation and maintenance of the individual system(s) must be (a) member(s) of the Auditors group. This will permit the responsible administrator to enable and configure system auditing, and perform maintenance functions related to the logs. Administrators who are not responsible for maintenance on an individual system will not be included in the Auditors group.
Fix Text (F-WN08-GE-000012_fix)
Create an Auditors group for controlling the Windows Event Logs and assign the necessary rights and access controls.