atomic-threat-coverage/logging_policies/LP_0046_windows_audit_security_state_change.yml
yugoslavskiy 68d4929a53 general update:
- DN calc function updated, fixed incorrect calc for multiple DRs
- updated all LPs with a preparation for a new feature (sucess/fail LP config calculcation per DR/EID)
- all the stuff (md/confluence) has been updated according to changes

updated with a log source sample:

- DN_0046_1031_dhcp_service_callout_dll_file_has_caused_an_exception.yml
- DN_0047_1032_dhcp_service_callout_dll_file_has_caused_an_exception.yml
- DN_0049_1034_dhcp_service_failed_to_load_callout_dlls.yml

created:

- DN_0086_4720_user_account_was_created.yml
- DN_0087_5156_windows_filtering_platform_has_permitted_connection.yml
- DN_0088_4616_system_time_was_changed.yml
- DN_0089_56_terminal_server_security_layer_detected_an_error.yml
- DN_0090_50_terminal_server_security_layer_detected_an_error.yml
- LP_0045_windows_audit_filtering_platform_connection.yml
- LP_0046_windows_audit_security_state_change.yml
2019-07-12 06:38:49 +03:00

24 lines
785 B
YAML

title: LP_0046_windows_audit_security_state_change
default: Configured
volume: Low
description: >
Audit Security State Change contains Windows startup, recovery,
and shutdown events, and information about changes in system time
eventID:
- 4608 # (S): Windows is starting up
- 4616 # (S): The system time was changed
- 4621 # (S): Administrator recovered system from CrashOnAuditFail
references:
- https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-security-state-change
configuration: |
Steps to implement logging policy with Group Policies:
```
Computer Configuration >
Windows Settings >
Security Settings >
Advanced Security Audit Policy Settings >
Audit Policies >
System >
Audit Security State Change (Success)
```