Blog Post
Windows 11, version 25H2 security baseline
Until this change, Microsoft had not set a recommendation for this audit setting, which allowed customers to enable it on an ad hoc basis when needed and when there is a plan to make use of that additional information. The concern had been exactly as Rick describes, that passwords are incorporated into command lines far too often. AFAIK, Windows includes no built-in feature to encrypt event logs as they are being written. The threat is mitigated somewhat by the restrictive default permissions on the Security event log.
The following ADMX policy will let you encrypt event logs however, it will pretty much make it impossible for non-authorized users who do not have access to the private key to decrypt logs.
Largely created too much burden and most will have same private key being used on each device otherwise the private/public key management turns into a nightmare.
https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-admx-eventlogging#enableprotectedeventlogging
- If you enable this policy setting, components that support it will use the certificate you supply to encrypt potentially sensitive event log data before writing it to the event log. Data will be encrypted using the Cryptographic Message Syntax (CMS) standard and the public key you provide. You can use the Unprotect-CmsMessage PowerShell cmdlet to decrypt these encrypted messages, provided that you have access to the private key corresponding to the public key that they were encrypted with.
- AaronMargosis_TaniumOct 27, 2025Iron Contributor
Amarjeet5 - thanks for that pointer. I had missed the introduction of that feature in Windows. It's unfortunate that there's so little documentation from Microsoft about it: I see none beyond how to configure it using that CSP you linked or via PowerShell cmdlets. "Protected Event Logging lets participating applications encrypt sensitive data written to the event log." What are "participating applications?" What parts of Windows participate?