I think there are still some facilities that can make use of it, but it's
probably there more for backwards compatibility at this point.

Easy enough to keep disabled.



 *ASB *(Professional Bio <http://about.me/Andrew.S.Baker/bio>)
 *Harnessing the Advantages of Technology for the SMB market...

 *



On Wed, May 11, 2011 at 6:09 AM, James Rankin <kz2...@googlemail.com> wrote:

> I think renaming of accounts is seriously outdated now, personally. The SID
> can just as easily be used to identify the account anyway. I'm surprised MS
> still maintain the "Guest" account - I've never known anyone use it, as you
> say.
>
>
> On 11 May 2011 11:05, Robert Cato <cato.rob...@gmail.com> wrote:
>
>>
>> DISA requires renaming and disabling the guest account. I understand the
>> logic, rename the account from the get-go and then if you use it (not that I
>> know anyone that does), it is not the default name. This is easily done with
>> a GPO.
>>
>> DISA has guidelines about seriously restricting access to the log files
>> but makes no mention of encryption.
>>
>> Robert
>>
>> On Tue, May 10, 2011 at 11:19 PM, Sean Martin <seanmarti...@gmail.com>wrote:
>>
>>>  Thanks, everyone, for confirming I wasn't off base for thinking this
>>> was an unusual request. I should've known better because these are the same
>>> auditors that "preferred" we rename the domain guest account even though it
>>> is disabled. Just another line item to cross off their checklists I guess.
>>>
>>> - Sean
>>>
>>>
>>> On May 10, 2011, at 6:58 PM, Level 5 Lists <li...@levelfive.us> wrote:
>>>
>>>   I have 2 clients that get audited by trustwave annually onsite, and
>>> quarterly pen tests. In all the audits I have done with different auditors
>>> no one has requested us to do this. We do event log collection into an sql
>>> database that is not encrypted. No one has also ever asked that we encrypt
>>> that database either.
>>>
>>>
>>>
>>> You can look for yourself on the PCI requirements checklist and see if
>>> this is mentioned anywhere. They are updated annually at least.
>>>
>>>
>>>
>>> *From:* Andrew S. Baker [mailto:asbz...@gmail.com]
>>> *Sent:* Tuesday, May 10, 2011 10:51 PM
>>> *To:* NT System Admin Issues
>>> *Subject:* Re: Encrypting Event Logs
>>>
>>>
>>>
>>> Indeed!  :)
>>>
>>>
>>>
>>>
>>> *ASB *(Professional Bio <http://about.me/Andrew.S.Baker/bio>)
>>> *Harnessing the Advantages of Technology for the SMB market...**
>>> *
>>> * *
>>>
>>>
>>>
>>>  On Tue, May 10, 2011 at 7:42 PM, Free, Bob < <r...@pge.com>r...@pge.com>
>>> wrote:
>>>
>>> Yea, what you said. Another in a long line of totally clueless auditors….
>>>
>>>
>>>
>>> Sometimes I think their only goal in life is to come up with a finding
>>> that no one else ever has before..
>>>
>>>
>>>
>>> *From:* Michael B. Smith [mailto: <mich...@smithcons.com>
>>> mich...@smithcons.com]
>>> *Sent:* Tuesday, May 10, 2011 3:04 PM
>>>
>>>
>>> *To:* NT System Admin Issues
>>>
>>> *Subject:* RE: Encrypting Event Logs
>>>
>>>
>>>
>>> Tttthhhhbbbbbttttt.
>>>
>>>
>>>
>>> Regards,
>>>
>>>
>>>
>>> Michael B. Smith
>>>
>>> Consultant and Exchange MVP
>>>
>>> <http://theessentialexchange.com/>http://TheEssentialExchange.com<http://theessentialexchange.com/>
>>>
>>>
>>>
>>> *From:* Sean Martin [mailto: <seanmarti...@gmail.com>
>>> seanmarti...@gmail.com]
>>> *Sent:* Tuesday, May 10, 2011 3:43 PM
>>> *To:* NT System Admin Issues
>>> *Subject:* Encrypting Event Logs
>>>
>>>
>>>
>>> Good morning/afternoon,
>>>
>>>
>>>
>>> My manager has requested I look for ways to "encrypt the event logs on
>>> our DCs". Apparently during one of our many audits (governing body to remain
>>> nameless) one of the auditors insisted that we should be encrypting the
>>> event logs on our DCs. I have since requested a formal finding be provided
>>> by the auditor indicating the perceived risks so that I can first identify
>>> if we have any mitigating controls already in place.
>>>
>>>
>>>
>>> With that, I thought I would start looking around for specific solutions.
>>> We're currently running Windows 2003 DCs in a Windows 2003 Native AD
>>> environment. I'm not finding a whole lot of solutions specific to encrypting
>>> "event logs". We are planning on introducing Windows 2008 R2 DCs this year
>>> so I will research bit locker, but, I'm concered about the inter-operability
>>> with Symantec SIM.
>>>
>>>
>>>
>>> I'm still working with very little information so I'm probably missing a
>>> lot of content. I guess I would just like to find out if anyone else has
>>> received similiar directives from an audit and what solutions or mitigating
>>> controls helped satisfy the auditor's concerns.
>>>
>>>
>>>
>>> - Sean
>>>
>>>
>>>
>>>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to