WDNS-SI-000009 - The Windows 2012 DNS Server must generate audit records for the success and failure of start and stop of the DNS Server service - enhanced

Information

Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being performed on the system, where an event occurred, when an event occurred, and by whom the event was triggered, in order to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, to recognize resource utilization or capacity thresholds, or to simply identify an improperly configured DNS system. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis.

Solution

Log on to the DNS server using the Domain Admin or Enterprise Admin account.

Press Windows Key + R, execute dnsmgmt.msc.

Right-click the DNS server, select Properties.

Click on the Event Logging tab. By default, all events are logged.

Select the 'Errors and warnings' or 'All events' option.

Click on Apply.

Click on OK.

For Windows 2012 R2 DNS Server, run eventvwr.msc at an elevated command prompt.

In the Event viewer, navigate to the applications and Services Logs\Microsoft\Windows\DNS Server.

Right-click DNS Server, point to View, and then click 'Show Analytic and Debug Logs'.

Right-click Analytical and then click on Properties.

Select the 'Enable logging' check box.

Click on OK.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_Server_DNS_V1R14_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12, CAT|II, CCI|CCI-002702, Rule-ID|SV-73149r3_rule, STIG-ID|WDNS-SI-000009, Vuln-ID|V-58719

Plugin: Windows

Control ID: 183b6fcadf3892a1ca1fd4c7bb1ec1a172eadaa58e7596ad13c84f9d0ec47cc2