V-278923
CAT IIWindows 10 must be configured to audit registry failures.
- Ships Affected
- 1
- Total Findings
- 2
- Open
- 2
- Closed
- 0
Check Text
Verify that Audit Registry auditing has been enabled:
Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> Audit Registry.
If "Audit Registry" is not set to "Failure", this is a finding.
Fix Text
Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> "Audit Registry" with "Failure" selected.
STIG Reference
- STIG
- Microsoft Windows 10 Security Technical Implementation Guide
- Version
- 3
- Release
- 6
- Rule ID
- SV-278923r1135287_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | MONT-SW-89134_Win10_V3R5_20251217-201218.ckl | Unassigned | 2026-03-04T15:25:42.339596 | View in Context | |
| USNS MONTFORD POINT | T-ESD-1 | MONT-SW-89108_Win10_V3R5_20251217-203019.ckl | Unassigned | 2026-03-04T15:25:16.342077 | View in Context |