20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'

Information

This policy setting restricts permissions to the Application Event Log for all non-privileged users.

The STIG recommended state for this setting is: Eventlog - Full Control SYSTEM - Full Control and Administrators -Full Control

Restricting permissions on the Application Event Log will prevent non-privileged users from viewing and deleting the log. Preserving an audit trail of system activity can help identify possible compromises, detect attacks, and troubleshoot system performance and configuration errors.

Solution

To establish the recommended configuration, set the NTFS permissions on the file below to Eventlog - Full Control SYSTEM - Full Control and Administrators - Full Control :

%SystemRoot%\ System32\winevt\Logs\Application.evtx

Note: If the location of the event logs has been changed, when adding permissions, the event log user, Eventlog must be entered as NT Service\Eventlog

Impact:

Non-privileged accounts will not be able to view or delete the Application Event Log.

See Also

https://workbench.cisecurity.org/benchmarks/18857

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9(4)

Plugin: Windows

Control ID: aa2756f4772fd6ad72dc6294ac2892af0efa84cafeda37254c7bc3149b5e66bf