Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.109588
Categoría:Policy
Título:Microsoft Windows: Audit Other Logon/Logoff Events
Resumen:Audit Other Logon/Logoff Events determines whether Windows;generates audit events for other logon or logoff events.;;These other logon or logoff events include:;; - A Remote Desktop session connects or disconnects.;; - A workstation is locked or unlocked.;; - A screen saver is invoked or dismissed.;; - A replay attack is detected. This event indicates that a Kerberos request was received twice with;identical information. This condition could also be caused by network misconfiguration.;; - A user is granted access to a wireless network. It can be either a user account or the computer;account.;; - A user is granted access to a wired 802.1x network. It can be either a user account or the;computer account.;;Logon events are essential to understanding user activity and detecting potential attacks.;;(C) Microsoft Corporation 2017.
Descripción:Summary:
Audit Other Logon/Logoff Events determines whether Windows
generates audit events for other logon or logoff events.

These other logon or logoff events include:

- A Remote Desktop session connects or disconnects.

- A workstation is locked or unlocked.

- A screen saver is invoked or dismissed.

- A replay attack is detected. This event indicates that a Kerberos request was received twice with
identical information. This condition could also be caused by network misconfiguration.

- A user is granted access to a wireless network. It can be either a user account or the computer
account.

- A user is granted access to a wired 802.1x network. It can be either a user account or the
computer account.

Logon events are essential to understanding user activity and detecting potential attacks.

(C) Microsoft Corporation 2017.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2018 Greenbone Networks GmbH

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.