Include command line in process creation events
Jump to overview

Policy overview

Key metadata and intent for this policy.

Computer
Category
System > Audit Process Creation
Supported on
At least Windows Server 2012 R2, Windows 8.1 or Windows RT 8.1

Supported OS tags: Windows10, Windows10RT, Windows11, Windows81, WindowsRT81, WindowsServer2012R2, WindowsServer2016

This policy setting determines what information is logged in security audit events when a new process has been created. This setting only applies when the Audit Process Creation policy is enabled. If you enable this policy setting the command line information for every process will be logged in plain text in the security event log as part of the Audit Process Creation event 4688, "a new process has been created," on the workstations and servers on which this policy setting is applied. If you disable or do not configure this policy setting, the process's command line information will not be included in Audit Process Creation events. Default: Not configured Note: When this policy setting is enabled, any user with access to read the security events will be able to read the command line arguments for any successfully created process. Command line arguments can contain sensitive or private information such as passwords or user data.

Internal name
IncludeCmdLine
Policy ID
953a9233af00
Elements
0

Registry values

How enabled and disabled states update the registry.

ScopeRegistry locationTypeEnabled valueDisabled valueCopy
Computer
Path
Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit
Value name
ProcessCreationIncludeCmdLine_Enabled
REG_DWORD
HKLM
1
HKLM
0
Registry location
Type REG_DWORD · Computer
Path
Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit
Value name
ProcessCreationIncludeCmdLine_Enabled
Hive
HKLM
Enabled value
1
Disabled value
0

Policy elements

Inputs and configuration options exposed by this policy.

This policy has no additional user input fields.