Audit Policy Subcategories



Similar documents
Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

WINDOWS LOGGING CHEAT SHEET - Win 7/Win 2008 or later

Audit account logon events

[MS-GPAC]: Group Policy: Audit Configuration Extension

Find the Who, What, Where and When of Your Active Directory

[MS-GPAC]: Group Policy: Audit Configuration Extension

Windows 7 / Server 2008 R2 Configuration Overview. By: Robert Huth Dated: March 2014

Director and Windows Server 2008 (and 2003)

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Lepide Software

Active Directory 2008 Audit Management Pack Guide for Operations Manager 2007 and Essentials 2010

Windows Advanced Audit Policy Configuration

Integrating LANGuardian with Active Directory

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

PLANNING AND DESIGNING GROUP POLICY, PART 1

[MS-GPAC]: Group Policy: Audit Configuration Extension. Intellectual Property Rights Notice for Open Specifications Documentation

The Institute of Internal Auditors Detroit Chapter Presents

Installation Logon Recording Basis. By AD Logon Name AD Logon Name(recommended) By Windows Logon Name IP Address

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Enabling Auditing Manually

Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change

Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance

Defense Security Service Office of the Designated Approving Authority

ENABLE LOGON/LOGOFF AUDITING

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

How to monitor AD security with MOM

Hands-On Microsoft Windows Server 2008

White Paper. PCI Guidance: Microsoft Windows Logging

Step-by-step installation guide for monitoring untrusted servers using Operations Manager (Part 1 of 3)

TESTBED. SekChek for Windows Security Report. System: PUFFADDER (Snake.com) 10 November SekChek IPS

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

TrueEdit Remote Connection Brief

How to Connect to Berkeley College Virtual Lab Using Windows

Log Management and Intrusion Detection

Domain Controller Failover When Using Active Directory

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Introduction. Activating the CFR Module License. CFR Configuration

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

TESTBED Win2012 Server

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Windows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII

NetSpective Logon Agent Guide for NetAuditor

Active Directory Authentication Integration

Installing, Configuring, and Managing a Microsoft Active Directory

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

NetWrix Password Manager. Quick Start Guide

NNT PCI DSS Microsoft Windows Server 2012 R2 Benchmark 12/17/ :37

TROUBLESHOOTING GUIDE

ACTIVE DIRECTORY DEPLOYMENT

SHARING FILE SYSTEM RESOURCES

AD Certificate Distribution

Network. Overview. LabTech

Windows Server 2008/2012 Server Hardening

How To Manage Your On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory

User Guide - Exchange Public Folder idataagent

NetWrix Logon Reporter V 2.0

How To - Implement Clientless Single Sign On Authentication with Active Directory

Remote Terminal Service (RTS) User Guide (Version 2.1)

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network

Windows Vista: Connecting to the wireless network at Hood College

Using the BWSD Help Desk Website

Objectives. At the end of this chapter students should be able to:

Active Directory Software Deployment

Create, Link, or Edit a GPO with Active Directory Users and Computers

Windows Clients and GoPrint Print Queues

Microsoft Windows Server 2008 Active Directory, Configuring

Configuring IBM Cognos Controller 8 to use Single Sign- On

Windows Log Monitoring Best Practices for Security and Compliance

Monitoreando Active Directory usando OpManager

ILTA HANDS ON Securing Windows 7

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Evaluator s Guide. PC-Duo Enterprise HelpDesk v5.0. Copyright 2006 Vector Networks Ltd and MetaQuest Software Inc. All rights reserved.

Asta Development. Product Installation Guide

EVENT LOG MANAGEMENT...

How to - Install EventTracker and Change Audit Agent

WINDOWS PROCESSES AND SERVICES

System Area Management Software Tool Tip: Agent Deployment utilizing. the silent installation with Active Directory

Microsoft Dynamics GP Release

AD CS.

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Windows Server 2003 default services

NTP Software QFS for NAS, Hitachi Edition

Using IPSec in Windows 2000 and XP, Part 2

Pcounter for Windows

Activity 1: Scanning with Windows Defender

IIS, FTP Server and Windows

Windows Mail POP Instructions - Bloomsburg University Students

How-to: Single Sign-On

Getting Started With Delegated Administration

pcanywhere Advanced Configuration Guide

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Transcription:

668 CHAPTER 20 Windows Server 2008 R2 Management and Maintenance Practices These recommended settings are sufficient for the majority of organizations. However, they can generate a heavy volume of events in a large organization. Or, there might be a subset of security events that an organization needs to track. In those cases, the next section discusses how to fine-tune the audit policy using audit policy subcategories. Audit Policy Subcategories Windows Server 2008 R2 allows more granularity in the setting of the audit policies. In previous versions of the Windows Server platform, the audit policies could only be set on the general categories. This usually resulted in a large number of security events, many of which are not of interest to the administrator. System management software was usually needed to help parse all the security events to find and report on the relevant entries. Windows Server 2008 R2 exposes additional subcategories under each of the general categories, which can each be set to No Auditing, Success, Failure, or Success and Failure. These subcategories allow administrators to fine-tune the audited events. Unfortunately, the audit categories do not quite match the audit policies. Table 20.5 shows how the categories match the policies. TABLE 20.5 Audit Policy Matching Audit Policies to Audit Categories Audit account logon events Audit account management Audit directory service access Audit logon events Audit object access Audit policy change Audit privilege use Audit process tracking Audit system events Account Logon Account Management DS Access Logon/Logoff Object Access Policy Change Privilege Use Detailed Tracking System There are over 50 different subcategories that can be individually set. These give the administrator and security professionals unprecedented control over the events that will generate security log entries. Table 20.6 lists the categories and the subcategories of audit policies.

Auditing the Environment 669 TABLE 20.6 Audit Subcategories Audit Subcategory System Logon/Logoff Object Access Privilege Use Security State Change Security System Extension System Integrity IPSec Driver Other System Events Logon Logoff Account Lockout IPSec Main Mode IPSec Quick Mode IPSec Extended Mode Special Logon Network Policy Server Other Logon/Logoff Events File System Registry Kernel Object SAM Certification Services Application Generated Handle Manipulation File Share Filtering Platform Packet Drop Detailed File Share Filtering Platform Connection Other Object Access Events Sensitive Privilege Use Non-Sensitive Privilege Use Other Privilege Use Events Detailed Tracking Process Creation Process Termination DPAPI Activity RPC Events 20

670 CHAPTER 20 Windows Server 2008 R2 Management and Maintenance Practices TABLE 20.6 Audit Subcategories Policy Change Account Management DS Access Account Logon Audit Subcategory Audit Policy Change Authentication Policy Change Authorization Policy Change MPSSVC Rule-Level Policy Change Filtering Platform Policy Change Other Policy Change Events User Account Management Computer Account Management Security Group Management Distribution Group Management Application Group Management Other Account Management Event Directory Service Access Directory Service Changes Directory Service Replication Detailed Directory Service Replication Kerberos Service Ticket Operations Credential Validation Kerberos Authentication Service Other Account Logon Events You can use the AUDITPOL command to get and set the audit categories and subcategories. To retrieve a list of all the settings for the audit categories and subcategories, use the following command: auditpol /get /category:* To enable auditing of the Distribution Group Management subcategory of the Account Management category for both success and failure events, the following command can be used: auditpol /set /subcategory: Distribution Group Management /success:enable /failure:enable This command would need to be run on each domain controller for the policy to have a uniform effect. To get all the options for the Audit Policy command, use the following command: auditpol /?

Auditing the Environment 671 Auditing Resource Access Object access can be audited, although it is not one of the recommended settings. Auditing object access can place a significant load on the servers, so it should only be enabled when it is specifically needed. Auditing object access is a two-step process: Step one is enabling Audit object access and step two is selecting the objects to be audited. When enabling Audit object access, you need to decide if both failure and success events will be logged. The two options are as follows:. Audit object access failure enables you to see if users are attempting to access objects to which they have no rights. This shows unauthorized attempts.. Audit object access success enables you to see usage patterns. This shows misuse of privilege. Enable the appropriate policy setting in the Group Policy Object. It is a best practice to apply the GPO as close to the monitored system as possible, so avoid enabling the auditing on too wide a set of systems. NOTE Monitoring both success and failure resource access can place additional strain on the system. Success events can generate a large volume of events. After enabling the object access policy, the administrator can make auditing changes through the property pages of a file, folder, or a Registry key. If the object access policy is enabled for both success and failure, the administrator will be able to audit both successes and failures for a file, folder, or Registry key. After object access auditing is enabled, you can easily monitor access to resources such as folders, files, and printers. Auditing Files and Folders The network administrator can tailor the way Windows Server 2008 R2 audits files and folders through the property pages for those files or folders. Keep in mind that the more files and folders that are audited, the more events that can be generated, which can increase administrative overhead and system resource requirements. Therefore, choose wisely which files and folders to audit. To audit a file or folder, do the following: 1. In Windows Explorer, right-click the file or folder to audit and select Properties. 2. Select the Security tab and then click the Advanced button. 3. In the Advanced Security Settings window, select the Auditing tab and click the Edit button. 4. Click the Add button to display the Select User or Group window. 5. Enter the name of the user or group to audit when accessing the file or folder. Click the Check Names button to verify the name. 20

672 CHAPTER 20 Windows Server 2008 R2 Management and Maintenance Practices 6. Click OK to open the Auditing Entries window. 7. In the Auditing Entry window, shown in Figure 20.13, select which events to audit for successes or failures. FIGURE 20.13 The Auditing Entry window. 8. Click OK four times to exit. NOTE This step assumes that the audit object access policy has been enabled. When the file or folder is accessed, an event is written to Event Viewer s security log. The category for the event is Object Access. An Object Access event is shown in the following security log message: Log Name: Security Source: Microsoft-Windows-Security-Auditing Date: 9/28/2009 6:22:56 PM Event ID: 4663 Task Category: File System Level: Information Keywords: Audit Success User: N/A Computer: DC1.companyabc.com