Generate Reports About User Actions on Windows Servers



Similar documents
Outgoing VDI Gateways:

Remote Vendor Monitoring

WHAT S NEW 4.5. FileAudit VERSION.

Edit system files. Delete file. ObserveIT Highlights. Change OS settings. Change password. See exactly what users are doing!

Record and Replay All Windows and Unix User Sessions Like a security camera on your servers

administrator are Console Users that can log on to the Web Management console and

ObserveIT User Activity Monitoring software meets the complex compliance and security challenges related to user activity auditing.

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Log Blindspots: A review of cases where System Logs are insufficient

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Netwrix Auditor for File Servers

OBSERVEIT DEPLOYMENT SIZING GUIDE

Role Based Access Control for Industrial Automation and Control Systems

Escalation Server Documentation For Tele-Support HelpDesk Rev 5/29/2001

Netwrix Auditor for Windows Server

GFI White Paper PCI-DSS compliance and GFI Software products

Installing, Configuring, and Managing a Microsoft Active Directory

AdminToys Suite. Installation & Setup Guide

How to monitor AD security with MOM

7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia

SharePoint Governance Execution

OBSERVEIT 6.0 WHAT S NEW

SysPatrol - Server Security Monitor

Maximize your Remote Desktop Services

HOW OBSERVEIT ADDRESSES KEY INDIA DOT REMOTE ACCESS SECURITY REQUIREMENTS

Table of Contents WELCOME TO ADAUDIT PLUS Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

Overview. Timeline Cloud Features and Technology

GETTING STARTED GUIDE 4.5. FileAudit VERSION.

Server Monitoring: Centralize and Win

Netwrix Auditor for Exchange

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Tableau Server. Permissions, Roles, and Content Authorization

NETWRIX USER ACTIVITY VIDEO REPORTER

Group Policy for Beginners

TSPrint - Usage Guide. Usage Guide. TerminalWorks TSPrint Usage Guide. support@terminalworks.com

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Server Edition Administrator s Guide

Windows PCs & Servers are often the life-blood of your IT investment. Monitoring them is key, especially in today s 24 hour world!

FileMaker Security Guide The Key to Securing Your Apps

Amadeus Selling Platform 3.1 P120

DigitalPersona Privacy Manager Pro

Reports, Features and benefits of ManageEngine ADAudit Plus

Security White Paper The Goverlan Solution

Benefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp).

ISO COMPLIANCE WITH OBSERVEIT

RES PowerFuse Version Comparison Chart (1/9)

WhatsUp Gold v11 Features Overview

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

ILTA HANDS ON Securing Windows 7

ObserveIT User Activity Monitoring

GETTING STARTED GUIDE. FileAudit VERSION.

How to Audit the 5 Most Important Active Directory Changes

What s New in Centrify DirectAudit 2.0

Monitoring Replication

Integrating LANGuardian with Active Directory

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Module 7 Management. Section 7.1: WSUS. CIST2414 Microsoft Server Administrator. Summary. Windows Server 2008 Server Administrator

Management Center. Installation and Upgrade Guide. Version 8 FR4

HP Connection Manager. Administrator's Guide

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Terminal Server Citrix MetaFrame Installation Guide

NETWRIX FILE SERVER CHANGE REPORTER

What s New in Centrify Server Suite 2013 Update 2

Monitoring App V eg Enterprise v6

Audit account logon events

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

What s New Guide: Version 5.6

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NETWRIX EVENT LOG MANAGER

WatchDox Administrator's Guide. Application Version 3.7.5

Workflow Templates Library

NETWRIX EVENT LOG MANAGER

11.1. Performance Monitoring

VMware Mirage Web Manager Guide

Understanding Task Scheduler FIGURE Task Scheduler. The error reporting screen.

Keeping Tabs on the Top 5 Critical Changes in Active Directory with Netwrix Auditor

Background Information

Centralizing Windows Events with Event Forwarding

Advanced Event Viewer Manual

Special Edition for FastTrack Software

Citrix XenDesktop Backups with Xen & Now by SEP

Admin Report Kit for Active Directory

Digitally Sign an InfoPath form and Submit using

USER ACTIVITY MONITORING FOR IBM SECURITY PRIVILEGED IDENTITY MANAGER

Netwrix Auditor for SQL Server

LT Auditor+ for Windows

How To Use The Numara Track-It! Help Desk And Asset Management Solution

Networking Lab - Vista Public Network Sharing

NetWrix Logon Reporter V 2.0

ACCESSING YOUR CHAFFEY COLLEGE VIA THE WEB

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

Remote Desktop Solution, (RDS), replacing CITRIX Home Access

Transcription:

Generate Reports About User Actions on Windows Servers Whenever there is need to generate reports about what users have been doing on your servers, most administrators are left empty handed. This need may arise due to some misconfiguration that someone did, a deleted configuration file, a registry key that someone edited, Active Directory objects such as users, groups or OUs that were changed or even deleted and many more. These configuration changes and other actions can potentially render a server or even the entire system inoperable, but the sad thing is that there are very few ways in which an administrator can truly see or tell what exactly happened and who did it. Have you seen the Microsoft Active Directory 70-640 Training video by Train Signal? I highly recommend this course, as you will learn much more than you will from any book. Train Signal's package includes new ipod/mp3 versions of the course (for learning on the go) and Transcender practice tests to help you prepare for certification. The instructors, Ed and Coach, do an amazing job not only preparing you to get Microsoft Certified but also showing you what tasks you need to perform on real Windows 2008 Servers, in the real world! The lack of reporting capability in Windows-based operating systems is not new. Administrators have been left "in the dark" ever since the old days, and although Windows Server 2008 and Windows Vista/7 have changed the way administrators work with the Event Viewer, it's still up to us to perform the tedious task of decrypting long and poorly written events, decipher event IDs (many of which share the same number, but for a wide variety of error codes and sources). Even with the new and re-designed Windows Server 2008/Vista/7 Event Viewer, many human actions are still not recorded. For example, unless you specifically enable Object Access auditing in the local policy of the system (or through a GPO), there is no way on earth to tell what files have been modified or deleted, by whom, and in what context. For example, getting a security event saying that someone tried to delete the Web.Config file of a web server repeatedly means nothing on it's own, unless you can see who did it, what else did they do (or attempt to do), and under what context. Now, lets say that your job requires you to perform a daily audit of all the privileged users' actions on a bunch of servers. How would you approach that kind of task? Is this something that Windows logs, Event Viewer, or any other type of built-in tool can give you? Can this help?

The answer to this is no. No matter how hard you try, no existing built-in Windows tool can even come close to getting you near the type of information you're after. Enter ObserveIT. ObserveIT is a company that has an amazing solution for one of the toughest questions that IT professionals face in today's dynamic IT world: Who touched my servers, what did they do, what did my privileged users do, what did my external vendors change on my servers. ObserveIT's product allows enterprise-wide recording and indexing of any human interaction with the servers, and what makes it so awesome is the fact that it indexes this data alongside with detailed metadata of what is seen on the screen, allowing full searches within the database. I've written more about ObserveIT's recording capabilities in my "Record and Audit Terminal, Citrix and RDP Sessions ObserveIT Product Overview" article. ObserveIT Express is a freeware version of ObserveIT's flag ship product - the Pro edition. Read more about it on my "Free Remote Desktop, Terminal & Citrix Session Recorder: ObserveIT Express" article. By implementing the freeware version of ObserveIT in your environment, you can get full visual recordings of up to 5 monitored servers. Another limitation of the Express edition is the fact that you can only reply the past 24 hours, however, detailed textual information is still available even past this time. The Pro edition is licensed, and there is no limit to the number of servers that can be monitored by it, and no limit on the recorded data replay capabilities. Furthermore, the Pro edition has many interesting configuration capabilities, as described in the above article.

One of the coolest features of version 5.0.0 is its ability to create and generate very complex and detailed reports that are extracted from the recorded data. The Reports View allows the administrator or security auditor to get aggregated or summary information about server and user activity. In this version, ObserveIT offers a newly designed and feature-rich reports generator that can be used either by novice administrators to generate reports based on the pre-configured and built-in reports, or by advanced administrators and security auditors that require flexible application usage reports and trend analysis reviews alike. Experienced administrators or security auditors can create comprehensive reports based on their requirements. Reports can be created to identify trends and usage, identify applications and users, and specify enhanced filters and sort-by columns. The built-in reports can be run by pressing one button, and within moments (based on the type and range of report), the administrator will be able to review the results in a separate window, print them or export the information to an Excel spreadsheet. Reports can also be scheduled to run at pre-defined intervals, and the results can then be e-mailed to SMTP aliases that need to review the results. This allows the administrators or security auditors to get daily, weekly or monthly reports of any type of user activity that was performed on the monitored servers, without having to manually dig through tons of log files and event IDs, most of which cannot even come close to giving them the entire picture of what happened on the monitored machines. The reports generator is controlled by the same granular permissions model that is used for Console Users, and this means that a report will not reveal information that the administrator does not have permissions to view. In this example, lets say that a company's security auditor has deployed ObserveIT, and now wants to generate a report of all the instances of Remote Desktop access that were performed on any of the organization's servers. After logging on to the ObserveIT web console, the administrator reviews the existing sample reports that were built-in into ObserveIT. One of these reports does exactly that. It generates a report of all the instances of Remote Desktop Connection (mstsc.exe) usage on the monitored servers.

The administrator runs the built-in sample report. Within a few seconds, a detailed report of all the RDP sessions in the past week is displayed.

This sample report includes 3 results, representing 3 different sessions to 3 different servers. Information can be expanded, as needed.

Reports can be edited to fit your needs. In this example, the built-in report looks at a one week period, but the administrator needs to get just the past day's results. So, they edit the report and save it. Note that editing reports is only available in the Pro edition. As noted above, reports can be e-mailed to specific administrators or security auditors, making their job a lot easier. All the needed information is sent to their inbox, daily.

You can obtain the freeware version of ObserveIT Express edition from this link: