18.8.3.1 Ensure 'Include command line in process creation events' is set to 'Disabled'

Information

This policy setting determines what information is logged in security audit events when a new process has been created.

The recommended state for this setting is: Disabled.

Rationale:

When this policy setting is enabled, any user who has read access to the security events can read the command-line arguments for any successfully created process. Command-line arguments may contain sensitive or private information such as passwords or user data.

Solution

To establish the recommended configuration via GP, set the following UI path to Disabled:

Computer Configuration\Policies\Administrative Templates\System\Audit Process Creation\Include command line in process creation events

Note: This Group Policy path may not exist by default. It is provided by the Group Policy template AuditSettings.admx/adml that is included with the Microsoft Windows 8.1 & Server 2012 R2 Administrative Templates (or newer).

Impact:

None - this is the default behavior.

Default Value:

Disabled. (The process's command line information will not be included in Audit Process Creation events.)

See Also

https://workbench.cisecurity.org/files/2700

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c.

Plugin: Windows

Control ID: 058abe0f62dd88d9b9a8bf3a647d286c8e4483d1f10ea603a5edab33443e00ef