UCF STIG Viewer Logo

Attempts to bypass access controls should be audited.


Overview

Finding ID Version Rule ID IA Controls Severity
V-15644 DG0141-SQLServer9 SV-25374r1_rule ECAR-2 ECAR-3 Medium
Description
Detection of suspicious activity including access attempts and successful access from unexpected places, during unexpected times, or other unusual indicators can support decisions to apply countermeasures to deter an attack. Without detection, malicious activity may proceed without impedance.
STIG Date
Microsoft SQL Server 2005 Instance Security Technical Implementation Guide 2015-04-03

Details

Check Text ( None )
None
Fix Text (F-20143r1_fix)
Enable Auditing level.

From the SQL Server Management Studio GUI:

1. Navigate to the SQL Server instance name
2. Right-click on it
3. Select Properties
4. Select Security tab or page
5. Review Login Auditing selection
6. Select "Failed logins only" or "Both failed and successful logins" from the Login Auditing section
7. Apply changes
8. Exit the SQL Server Management Studio GUI