What is Security Audit For Windows?
Last Updated :
19 Feb, 2020
A security audit is a process where manual or automated techniques are used for vulnerability analysis of any system and a report is generated. Manual audit includes the process of interviewing staff, performing vulnerability scans without using any automated tools, reviewing all installed applications and OS access controls, and analyzing physical access to the systems. In a security audit of an operating system comes windows audit, Linux audit, etc. Windows auditing is one of the methods to make the system secure after knowing about the weakness of the system. Windows auditing system consists of tracking events and logs and what events were triggered in the system.
Two important areas where operating system audits can be performed are
all the directories that are active or running in the background and
various policies of windows and privacy settings. Active Directory provides information about specific applications, folders, and files, based on their identity. Because it is an extensively used method in the authentication and authorization of users, it is often prone to cyber-attacks. Therefore, monitoring and auditing of changes in Active Directory should be considered an essential part of security audits. Another vital area is Windows Policy changes.
Events that can be audited in the Windows operating system for vulnerability assessment of systems are listed below:
- Audit Account Logon Events: Audit of each login and logout instances with the exact date and time of users.
- Audit Account Management: Audit of every instance of account management operations on a machine such as altering passwords, usernames of accounts, number of users, etc.
- Audit Objects Access: Audit the event of a user accessing an object with its system access control list (SACL) specified. A few examples of objects are files, folders, registry keys, printers, etc.
- Audit Policy Change: Audit every incident where user rights were changed, or change in audit policies or modifying trust policies.
- Audit Privilege and Use: Audit each instance of a user.
- Audit Process Tracking: Audit and track detailed information of events such as program activation, process exit, handle duplication, and indirect object access.
- Audit System Events: Audit all the patch updates, unknown connections being established.
Audit Life Cycle: The audit framework consists of four major steps. The first step is
Planning in which the auditors plan according to the requirements of the organization’s needs. The second part consists of an
Assessment in which the old audits are assessed and results are reviewed and then accordingly the new audit checklist is planned. The third step consists of
Follow-Up which is performing the audit tasks. And the last part consists of the
Report Phase in which a detailed report of the audit is created and the expected solutions are given.
Commands to Perform Audit: These are needed to be executed in the windows command prompt under administrator mode. To access the command prompt, click on the start button, search cmd, right-click on it and click on run as administrator option.
- Systeminfo: To get the full details of the system like installation date, users and accounts, last log activity, etc. command used is systeminfo that gives the complete details of a system.
- ipconfig: To get the IP address of a machine this command can be used.
- Secpol.msc: To retrieve the configuration of security policies of a system secpol.msc command is used that helps to know about account policies, Firewall policies, etc.
- getmac: To get the mac address of the machine.
- netstat: To check network statistics and analyze the foreign or unknown server that has successful connections established.
- compmgmt.msc: To check external devices that were used in the system and their logs etc.
Similar Reads
GeeksforGeeks Practice - Leading Online Coding Platform GeeksforGeeks Practice is an online coding platform designed to help developers and students practice coding online and sharpen their programming skills with the following features. GfG 160: This consists of most popular interview problems organized topic wise and difficulty with with well written e
6 min read
7 Different Ways to Take a Screenshot in Windows 10 Quick Preview to Take Screenshot on Windows 10:-Use the CTRL + PRT SC Keys to take a quick screenshot.Use ALT + PRT SC Keys to take a Screenshot of any application window.Use Windows + Shift + S Keys to access the Xbox Game Bar.Use Snip & Sketch Application as well to take screenshotTaking Scree
7 min read
ASCII Values Alphabets ( A-Z, a-z & Special Character Table ) ASCII (American Standard Code for Information Interchange) is a standard character encoding used in telecommunication. The ASCII pronounced 'ask-ee', is strictly a seven-bit code based on the English alphabet. ASCII codes are used to represent alphanumeric data. The code was first published as a sta
7 min read
What is an Operating System? An Operating System is a System software that manages all the resources of the computing device. Acts as an interface between the software and different parts of the computer or the computer hardware. Manages the overall resources and operations of the computer. Controls and monitors the execution o
5 min read
What is a Neural Network? Neural networks are machine learning models that mimic the complex functions of the human brain. These models consist of interconnected nodes or neurons that process data, learn patterns and enable tasks such as pattern recognition and decision-making.In this article, we will explore the fundamental
12 min read
Top 50 Java Project Ideas For Beginners and Advanced [Update 2025] Java is one of the most popular and versatile programming languages, known for its reliability, security, and platform independence. Developed by James Gosling in 1982, Java is widely used across industries like big data, mobile development, finance, and e-commerce.Building Java projects is an excel
15+ min read
COCOMO Model - Software Engineering The Constructive Cost Model (COCOMO) It was proposed by Barry Boehm in 1981 and is based on the study of 63 projects, which makes it one of the best-documented models. It is a Software Cost Estimation Model that helps predict the effort, cost, and schedule required for a software development project
15+ min read
Supervised and Unsupervised learning Supervised and unsupervised learning are two main types of machine learning. In supervised learning, the model is trained with labeled data where each input has a corresponding output. On the other hand, unsupervised learning involves training the model with unlabeled data which helps to uncover pat
10 min read
Advanced Encryption Standard (AES) Advanced Encryption Standard (AES) is a highly trusted encryption algorithm used to secure data by converting it into an unreadable format without the proper key. It is developed by the National Institute of Standards and Technology (NIST) in 2001. It is is widely used today as it is much stronger t
7 min read
GATE 2025 Syllabus For CSE (Computer Science & Engineering) GATE Exam 2025 Syllabus for CSE - GATE stands for Graduate Aptitude Test in Engineering, an entrance exam conducted each year for getting admission into the most prestigious institutes across the country including IISc Bengaluru, IITs, NITs, IIITs and many others. The GATE authority (IIT Roorkee for
7 min read