Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.109587
Category:Policy
Title:Microsoft Windows: Audit Logon
Summary:Audit Logon determines whether the operating system generates;audit events when a user attempts to log on to a computer.;;These events are related to the creation of logon sessions and occur on the computer that was;accessed. For an interactive logon, events are generated on the computer that was logged on to. For;a network logon, such as accessing a share, events are generated on the computer that hosts the;resource that was accessed.;;The following events are recorded:;; - Logon success and failure.;; - Logon attempts by using explicit credentials. This event is generated when a process attempts to;log on an account by explicitly specifying that account's credentials. This most commonly occurs in;batch configurations such as scheduled tasks, or when using the RunAs command.;; - Security identifiers (SIDs) are filtered.;;Logon events are essential to tracking user activity and detecting potential attacks.;;Event volume:;; - Low on a client computer.;; - Medium on a domain controllers or network servers.;;;(C) Microsoft Corporation 2017.
Description:Summary:
Audit Logon determines whether the operating system generates
audit events when a user attempts to log on to a computer.

These events are related to the creation of logon sessions and occur on the computer that was
accessed. For an interactive logon, events are generated on the computer that was logged on to. For
a network logon, such as accessing a share, events are generated on the computer that hosts the
resource that was accessed.

The following events are recorded:

- Logon success and failure.

- Logon attempts by using explicit credentials. This event is generated when a process attempts to
log on an account by explicitly specifying that account's credentials. This most commonly occurs in
batch configurations such as scheduled tasks, or when using the RunAs command.

- Security identifiers (SIDs) are filtered.

Logon events are essential to tracking user activity and detecting potential attacks.

Event volume:

- Low on a client computer.

- Medium on a domain controllers or network servers.


(C) Microsoft Corporation 2017.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.