1. Home
  2. Security Hardening
  3. DISA Microsoft Windows 2012 Server DNS STIG V2R4
  4. WDNS-AU-000001 – The Windows 2012 DNS Server must be configured to record, and make available to authorized personnel, who added/modified/deleted DNS zone information.

WDNS-AU-000001 – The Windows 2012 DNS Server must be configured to record, and make available to authorized personnel, who added/modified/deleted DNS zone information.

Details

Without a means for identifying the individual that produced the information, the information cannot be relied upon. Identifying the validity of information may be delayed or deterred.

This requirement ensures organizational personnel have a means to identify who produced or changed specific information in transfers, zone information, or DNS configuration changes.

Solution

Log on to the DNS server using the Domain Admin or Enterprise Admin account or Local Administrator account.

If not automatically started, initialize the ‘Server Manager’ window by clicking its icon from the bottom left corner of the screen.

On the opened ‘Server Manager’ window, from the left pane, click to select ‘DNS’.

From the right pane, under the ‘SERVERS’ section, right-click the DNS server.

From the displayed context menu, click the ‘DNS Manager’ option.

Click on the ‘Event Logging’ tab.

Select the ‘Errors and warnings’ or ‘All events’ option.

Click on ‘Apply’.

Click on ‘OK’.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability, Configuration Management.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles