Files
nuclei-templates/code/windows/audit/audit-logging-disabled.yaml
2024-10-24 13:54:16 +07:00

38 lines
1.1 KiB
YAML

id: audit-logging-disabled
info:
name: Audit Logging Disabled
author: princechaddha
severity: high
description: Check if audit logging for critical events is disabled.
impact: |
Disabling audit logging can lead to a lack of traceability for security incidents and breaches.
remediation: |
Enable audit logging for all critical security events to maintain a proper audit trail.
tags: windows,audit-logging,security,code,windows-audit
self-contained: true
code:
- pre-condition: |
IsWindows();
engine:
- powershell
- powershell.exe
args:
- -ExecutionPolicy
- Bypass
pattern: "*.ps1"
source: |
AuditPol /get /category:"Account Logon"
AuditPol /get /category:"Account Management"
matchers:
- type: word
words:
- "User Account Management No Auditing"
- "Computer Account Management No Auditing"
- "Security Group Management No Auditing"
- "Credential Validation No Auditing"
- "Kerberos Authentication Service No Auditing"