Application log readable |
---|
Risk Level: | Low | Check or Attack Name: applog |
---|---|---|
Platforms: | Windows NT | |
Description: | The Windows NT Application Log could be read from the network. If the user account is not one who should have access to the host, it may indicate that the Guest account is enabled and is allowed to access the computer from the network. If the account should not have that level of access, then the user permissions may be set incorrectly, or in the worst case, the Guest account is enabled and is a member of the Administrators group. Typically, the application log does not contain information an attacker would find useful. However, some applications, such as the Ataman Telnet, Rlogin, and Rexec may write sensitive information to the application log. |
|
Remedy: | Remove Administrator access for unauthorized user accounts and remove network access rights for the Guest account. To remove Administrator access from a user account, follow these steps:
To prevent remote log on of a Windows NT user account, follow these steps:
|
|
References: |
Know Your Risks |