windows-itpro-docs/windows/client-management/mdm/policy-csp-admx-auditsettings.md
2022-08-10 18:08:08 -04:00

3.0 KiB

title, description, ms.author, ms.localizationpriority, ms.topic, ms.prod, ms.technology, author, ms.date, ms.reviewer, manager
title description ms.author ms.localizationpriority ms.topic ms.prod ms.technology author ms.date ms.reviewer manager
Policy CSP - ADMX_AuditSettings Learn about the Policy CSP - ADMX_AuditSettings. vinpa medium article w10 windows vinaypamnani-msft 08/13/2020 aaroncz

Policy CSP - ADMX_AuditSettings.

Tip

This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see Understanding ADMX-backed policies.

You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to Enabling a policy.

The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see CDATA Sections.


ADMX_AuditSettings policies

ADMX_AuditSettings/IncludeCmdLine

ADMX_AuditSettings/IncludeCmdLine

Edition Windows 10 Windows 11
Home No No
Pro Yes Yes
Windows SE No Yes
Business Yes Yes
Enterprise Yes Yes
Education Yes Yes

Scope:

[!div class = "checklist"]

  • Device

This policy setting determines what information is logged in security audit events when a new process has been created. This setting only applies when the Audit Process Creation policy is enabled.

If you enable this policy setting, the command line information for every process will be logged in plain text in the security event log as part of the Audit Process Creation event 4688, "a new process has been created," on the workstations and servers on which this policy setting is applied.

If you disable or don't configure this policy setting, the process's command line information won't be included in Audit Process Creation events.

Default is Not configured.

Note

When this policy setting is enabled, any user with access to read the security events will be able to read the command line arguments for any successfully created process. Command line arguments can contain sensitive or private information, such as passwords or user data.

ADMX Info:

  • GP Friendly name: Include command line in process creation events
  • GP name: IncludeCmdLine
  • GP path: System/Audit Process Creation
  • GP ADMX file name: AuditSettings.admx

ADMX-backed policies in Policy CSP