20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion'

Information

This setting restricts permissions to the Event Viewer, which is used to view and manipulate log data.

The STIG recommended state for this setting is: TrustedInstaller - Full Control Administrators - Read & Execute SYSTEM - Read & Execute Users - Read & Execute ALL APPLICATION PACKAGES - Read & Execute and ALL RESTRICTED APPLICATION PACKAGES - Read & Execute

Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit information.

Solution

To establish the recommended configuration, set the NTFS permissions on the file below to TrustedInstaller - Full Control Administrators - Read & Execute SYSTEM - Read & Execute Users - Read & Execute ALL APPLICATION PACKAGES - Read & Execute and ALL RESTRICTED APPLICATION PACKAGES - Read & Execute :

%SystemRoot%\ System32\Eventvwr.exe

Impact:

Users will be able to open Event Viewer and view logs, but not able to delete logs.

See Also

https://workbench.cisecurity.org/benchmarks/15301

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9

Plugin: Windows

Control ID: 9da3837c4550c62f2ac972faf28a1e595b90a2bd5c0bba2376701991cd519e90