
26
•
Generate security audits
•
Back up files and directories
•
Restore files and directories
Warning
: Enabling privilege auditing generates a very large number of event records. For this
reason, each security environment defined in this guide has unique recommendations for these
settings. Failed use of a user right is an indicator of a general network problem and often can be a
sign of an attempted security breach. Corporations should set the
Audit privilege use
setting to
Enable
only if there is a specific business reason to do so.
Event ID
Event Description
576
Specified privileges were added to a user’s access token.
Note
: This event is generated
when the user logs on.
577
A user attempted to perform a privileged system service operation.
578
Privileges were used on an already open handle to a protected object.
Audit Process Tracking
Member Server Default
Legacy Client
Enterprise Client
High Security Client
No Auditing
No Auditing
No Auditing
No Auditing
The
Audit process tracking
setting determines whether to audit detailed tracking information for events
such as program activation, process exit, handle duplication, and indirect object access. Configuring
this setting to
Success
generates an audit entry each time the process being tracked succeeds.
Configuring this setting to
Failure
generates an audit entry each time the process being tracked fails.
Enabling
Audit process tracking
will generate a large number of events, so typically it is set to
No
Auditing.
However, these settings can provide a great benefit during an incident response from the
detailed log of the processes started and the time when they were launched.
Event ID
Event Description
592
A new process was created.
593
A process exited.
594
A handle to an object was duplicated.
595
Indirect access to an object was obtained.
596
A data protection master key was backed up.
Note:
The master key is used by the CryptProtectData and CryptUnprotectData routines,
and Encrypting File System (EFS). The master key is backed up each time a new one is
created. (The default setting is 90 days.) The key is usually backed up by a domain
controller.
597
A data protection master key was recovered from a recovery server.
598
Auditable data was protected.
599
Auditable data was unprotected.
600
A process was assigned a primary token.
601
A user attempted to install a service.
602
A scheduler job was created.