
These audit events can help you understand how a computer is being used and to track user activity.Įvent volume: Low to medium, depending on system usageĭefault: Not configured In order to see the additions to event ID 4688, you must enable the new policy setting: Include command line in process creation events This security policy setting determines whether the operating system generates audit events when a process is created (starts) and the name of the program or user that created it.
AUDIT LOGON WINDOWS
Policy location: Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Configuration > Detailed Tracking To enable the Audit Process Creation policy, edit the following group policy:

You must have Audit Process Creation auditing enabled to see event ID 4688. To see the effects of this update, you'll need to enable two policy settings. Because of this additional logging we can now see that not only was the wscript.exe process started, but that it was also used to execute a VB script.
AUDIT LOGON UPDATE
Prior to this update none of the information for Process Command Line gets logged. Review the updated event ID 4688 in REF _Ref366427278 \h Figure 16.
AUDIT LOGON WINDOWS 10
Windows 10 Security Technical Implementation Guideĭetails Check Text ( C-22472r554756_chk ) If it is to a network share, it is recorded on the system accessed. If this is an interactive logoff, it is recorded on the local system. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised.


Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks.
