This is not the latest version of the STIG. This is provided for archival purposes. See the latest STIG.

Windows 11 must have command line process auditing events enabled for failures.

STIG ID: WN11-AU-000585  |  SRG: SRG-OS-000037-GPOS-00015 |  Severity: medium (CAT II)  |  CCI: CCI-002234 |  Vulnerability Id: V-257770

Vulnerability Discussion

When this policy setting is enabled, the operating system generates audit events when a process fails to start and the name of the program or user that created it.

These audit events can assist in understanding how a computer is being used and tracking user activity.

Check

Ensure Audit Process Creation auditing has been enabled:

Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policy >> Detailed Tracking >> Audit Process Creation.

If "Audit Process Creation" is not set to "Failure", this is a finding.

Fix

Go to Computer Configuration >> Windows Settings >>Security Settings>> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> Set "Audit Process Creation" to "Failure".