1. Home
  2. Security Hardening
  3. CIS Microsoft Windows Server 2019 STIG DC L2 V1.0.1
  4. Ensure ‘Turn off Windows Error Reporting’ is set to ‘Enabled’

Ensure ‘Turn off Windows Error Reporting’ is set to ‘Enabled’

Details

This policy setting controls whether or not errors are reported to Microsoft.

Error Reporting is used to report information about a system or application that has failed or has stopped responding and is used to improve the quality of the product.

The recommended state for this setting is: Enabled.

Rationale:

If a Windows Error occurs in a secure, enterprise managed environment, the error should be reported directly to IT staff for troubleshooting and remediation. There is no benefit to the corporation to report these errors directly to Microsoft, and there is some risk of unknowingly exposing sensitive data as part of the error.

Impact:

Users are not given the option to report errors to Microsoft.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled:

Computer ConfigurationPoliciesAdministrative TemplatesSystemInternet Communication ManagementInternet Communication settingsTurn off Windows Error Reporting

Note: This Group Policy path is provided by the Group Policy template ICM.admx/adml that is included with all versions of the Microsoft Windows Administrative Templates.

Default Value:

Disabled. (Errors may be reported to Microsoft via the Internet or to a corporate file share.)

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Windows.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles