Vulnerability Discussion
Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event.
Check
Verify the operating system produces audit records containing information to establish the identity of any individual or process associated with the event. If it does not, this is a finding.
Fix
Configure the operating system to produce audit records containing information to establish the identity of any individual or process associated with the event.