Information
This policy setting determines which users or processes can generate audit records in the Security log.
The recommended state for this setting is: LOCAL SERVICE, NETWORK SERVICE
Note: This user right is considered a 'sensitive privilege' for the purposes of auditing.
An attacker could use this capability to create a large number of audited events, which would make it more difficult for a system administrator to locate any illicit activity. Also, if the event log is configured to overwrite events as needed, any evidence of unauthorized activities could be overwritten by a large number of unrelated events.
Solution
To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to LOCAL SERVICE, NETWORK SERVICE
User Rights\Generate security audits
Note: Include only one User or Group per line in the Settings Catalog configuration screen.
Impact:
On most computers, this is the default configuration and there will be no negative impact. However, if you have installed
Web Server (IIS)
, you will need to allow the IIS application pool(s) to be granted this user right.