How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel



Similar documents
How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

10.2. Auditing Cisco PIX Firewall with Quest InTrust

An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.

Foglight for SQL Server

Direct Migration from SharePoint 2003 to SharePoint 2010

Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference

Quest Management Agent for Forefront Identity Manager

Secure and Efficient Log Management with Quest OnDemand

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Go Beyond Basic Up/Down Monitoring

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

Migrating Your Applications to the Cloud

Eight Best Practices for Identity and Access Management

Taking Unix Identity and Access Management to the Next Level

Dell InTrust Preparing for Auditing and Monitoring Microsoft IIS

Enterprise Single Sign-On 8.0.3

10.6. Auditing and Monitoring Quest ActiveRoles Server

Using Stat with Custom Applications

Toad for Oracle Compatibility with Windows 7 Revealed

Enterprise Single Sign-On Installation and Configuration Guide

Key Methods for Managing Complex Database Environments

Proactive Performance Management for Enterprise Databases

4.0. Offline Folder Wizard. User Guide

Six Steps to Achieving Data Access Governance. Written By Quest Software

Quest One Privileged Account Appliance

6.0. Planning for Capacity in Virtual Environments Reference Guide

8.7. Resource Kit User Guide

An Innovative Approach to SOAP Monitoring. Written By Quest Software

The Case for Quest One Identity Manager

formerly Help Desk Authority Quest Free Network Tools User Manual

2.0. Quick Start Guide

FOR WINDOWS FILE SERVERS

Spotlight on Messaging. Evaluator s Guide

DATA GOVERNANCE EDITION

Top Seven Tips and Tricks for Group Policy in Windows 7

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer

Spotlight Management Pack for SCOM

Quest Application Performance Monitoring Implementation Methodology

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Quest Collaboration Services How it Works Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

Foglight. Dashboard Support Guide

Quest Support: vworkspace Troubleshooting Guide. Version 1.0

Foglight Cartridge for Active Directory Installation Guide

Foglight Managing Microsoft Active Directory Installation Guide

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

6.5. Web Interface. User Guide

Web Portal Installation Guide 5.0

Defender Delegated Administration. User Guide

Quest ChangeAuditor 4.8

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

System Requirements and Platform Support Guide

Dell InTrust Preparing for Auditing Cisco PIX Firewall

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell One Identity Cloud Access Manager How to Configure for High Availability

Foglight Foglight Experience Viewer (FxV) Upgrade Field Guide

Foglight. Foglight for Virtualization, Free Edition Installation and Configuration Guide

Moving to the Cloud : Best Practices for Migrating from Novell GroupWise to Microsoft Exchange Online Standard

Quest Collaboration Services 3.5. How it Works Guide

Dell InTrust Preparing for Auditing Microsoft SQL Server

formerly Help Desk Authority HDAccess Administrator Guide

Foglight. Managing Hyper-V Systems User and Reference Guide

Dell InTrust Auditing and Monitoring Microsoft Windows

Defender 5.7. Remote Access User Guide

Dell InTrust Preparing for Auditing CheckPoint Firewall

Spotlight Management Pack for SCOM

Authentication Services 4.1. Authentication Services Single Sign-on for SAP Integration Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Protecting and Auditing Active Directory with Quest Solutions

Benchmark Factory for Databases 6.5. User Guide

Dell Statistica Statistica Enterprise Installation Instructions

Exchange 2010 and Your Audit Strategy

Object Level Authentication

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Are You Spending More than You Realize on Active Directory Management?

Achieving ISO/IEC Compliance with Quest One Solutions for Privileged Access. Written By Quest Software, Inc.

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

ChangeAuditor 5.7. What s New

Transcription:

l 10.3 1.0 Installation Auditing and Configuration Microsoft ISA Server Guide How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software, Inc. The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA 92656 e-mail: info@quest.com Refer to our Web site (www.quest.com) for regional and international office information. TRADEMARKS AccessManager, Active Administrator, ActiveDL, ActiveGroups, ActiveRoles, AKONIX, Benchmark Factory, Big Brother, BOX & WAVE Design, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, ChangeAuditor, ChangeManager, CI Discovery, DataFactory, Defender, Deploy the Whole Desktop, Desktop Authority, Directory Analyzer, DirectoryExpert, DS Analyzer, DS Expert, Embargo, Enterprise Security Explorer, Enterprise Security Reporter, File System Auditor, Foglight, GPOAdmin, Help Desk Authority, InstantAssist, IntelliProfile, InTrust, itoken, J.CLASS and Design, JClass, Jint, JProbe, Kemma Software, Knowledge Xpert and Design, LiteSpeed, LiveReorg, LogAdmin, MessageStats, Move Mailbox Manager, MultSess, NBSpool, NetBase, NETPRO, PASSGO, PassGo Technologies (and design), Password Reset Manager, Patch Authority, PerformaSure, POINT, CLICK, DONE!, PowerGUI, Privilege Authority, Q.DESIGNER and Design, Quest, Quest Central, Quest Software, Quest Software and Design, Quest Software logo, ReportAdmin, RestoreAdmin, SCRIPTLOGIC, SCRIPTLOGIC (and Design), Secure Copy, Security Explorer, Security Lifecycle Map, SelfServiceAdmin, SharePlex, Spotlight, SQL Navigator, SQL TURBO, SQL TURBO and Design, SQL Watch, SQLAB, STAT, StealthCollect, T.O.A.D, Tag and Follow, TOAD, TOAD WORLD, vautomator, vconverter, vecoshell, VESI, vfoglight, VINTELA, VIZIONCORE, Vizioncore Automation Suite, Vizioncore vessentials, vmigrator, vranger, vspotlight, vtoad, WebDefender, Webthority, XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. For a complete list of Quest Software s trademarks, please see http://www.quest.com/legal/trademark-information.aspx. Other trademarks and registered trademarks are property of their respective owners. Quest InTrust Updated October 29, 2010 Software version 10.3

CONTENTS Processing Microsoft ISA Server Logs... 3 Configuring ISA Server Logging... 4 Gathering Microsoft ISA Server Events with InTrust... 5 Gathering Data Using Agents... 5 Gathering Data without Agents... 5 IP Addresses Resolution... 6 Appendix A. InTrust Knowledge Pack for Microsoft ISAS/Proxy Server... 7 Appendix B. InTrust for ISAS Reports... 8 About Quest Software, Inc.... 9 Contacting Quest Software... 9 Contacting Quest Support... 9 Third Party Contributions... 10 i

Auditing Microsoft ISA Server Processing Microsoft ISA Server Logs Using Quest InTrust, you can collect and report on audit data from Microsoft ISA Server 2000, 2004 or 2006 running on Microsoft Windows 2000 or Microsoft Windows Server 2003 platform. InTrust allows you to gather event data recorded by Microsoft Internet Security and Acceleration Server (ISAS) to the following audit trails: Microsoft ISA Server Web Proxy Log Microsoft ISA Server Firewall Log Windows Application Log (events generated by ISAS) Windows Security Log (events generated by ISAS) InTrust collects ISA Server Web Proxy Log and ISA Server Firewall logs written into the files of the following formats: W3C Extended File Format: contains both data and directives describing the version, date, and logged fields. Because the fields are described in the file, unselected fields are not logged. The tab character is used as delimiter. Date and time are in GMT. ISA Server file format: contains only data with no directives. All fields are always logged; unselected fields are logged as dash to indicate they are empty. The comma character is used as delimiter. The date and time fields are in local time. Also, InTrust can collect the ISA Server Web Proxy and Firewall logs data stored in the MSDE database format. When you select to save the logs to an MSDE database, logs are saved in databases named ISALOG_yyyymmdd_xxx_nnn where: yyyymmdd stands for the date the log database refers to (year, month, and day) xxx represents the type that the log database refers to: FWS represents the Firewall log WEB represents the Web Proxy log nnn is a number that distinguishes between log databases that refer to the same day 3

Quest InTrust 10.3 For each log database, two files are created: ISALOG_yyyymmdd_xxx_nnn.mdf and ISALOG_yyyymmdd_xxx_nnn.ldf. By default, the log information for MSDE logs and for the log files is stored in the ISALogs folder, under the ISA Server installation folder. If you change the location, the actual log folder may be different on every server. Configuring ISA Server Logging To configure logging, for example, of Microsoft ISA Server 2006, carry out the following: 1. In the console tree of ISA Server Management, click Monitoring: For ISA Server Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array_Name, and then click Monitoring. For ISA Server Standard Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Server_Name, and then click Monitoring. 2. In the details pane, click the Logging tab. 3. On the Tasks tab, select the appropriate task: Configure Firewall Logging Configure Web Proxy Logging 4. In the Properties dialog box, specify the logging options you need. To generate the most comprehensive reports, you can configure logging options so as to include all events in log. However, in this case you should consider the log size growth and plan for the log cleanup frequency. Use ISA Server logging options and InTrust gathering options to configure log retention period as you need. 4

Auditing Microsoft ISA Server Gathering Microsoft ISA Server Events with InTrust 1. In InTrust Manager, select Configuration Sites Microsoft Windows Network, and select the All ISA Servers site. 2. To automatically install agents on the site computers, select Install Agents from site's shortcut menu. Agentless gathering peculiarities are described later. 3. Select the ISAS Daily Collection task, or configure a new task you need, with a gathering job involving the necessary gathering policy and site. In the task properties, select the Schedule enabled option. 4. Select the ISAS Weekly Reporting task, or configure a new reporting task you need, and enable its schedule in the similar way. Gathering Data Using Agents To minimize network impact when communicating data from target computer to InTrust server, agents are recommended for data gathering. The following rights and permissions must be assigned to the InTrust agent account if the agent is not running under the LocalSystem account: 1. Read permission to the ISA server (or server array) configuration. 2. Read permission to the HKLM\SYSTEM\CurrentControlSet\Control\TimeZoneInformation registry key. 3. Read and List Folder Contents permissions to log file folders; the Delete permission must also be granted if the Clear log after gathering option is turned on for the data provider. Gathering Data without Agents You can configure InTrust to collect ISA Server 2000 logs without agents. To collect audit data from ISA Server 2004 and 2006, agents are required. To work without agents, Microsoft ISA Administrative Components must be installed on the InTrust server. On the processed computer, you can use Remote Registry Service, or Microsoft ISA Administrative Components. 5

Quest InTrust 10.3 The account under which the gathering service will access site computers (specified explicitly in the site s settings, or inherited from InTrust server or task) requires the following: a) Access this computer from the network right must be granted. b) Deny access to this computer from network right must be disabled. c) Membership in the local Administrators group. d) Read permission to the HKLM\SYSTEM\CurrentControlSet\Control\TimeZoneInformation registry key. e) Read permission to the HKLM\SYSTEM\CurrentControlSet\Control\Nls\Language registry key. f) Read and List Folder Contents permissions to log file folders; the Delete permission must also be granted if the Clear log after gathering option is turned on for the data source. IP Addresses Resolution If specified by InTrust settings, IP addresses found in the log are resolved to host names, and InTrust saves them both (IP addresses and host names) into the log, appending them to original fields. This can significantly slow down gathering process; that is why this option is disabled by default. If necessary, you can enable this option in the following way: 1. In InTrust Manager, select Configuration Data Sources. 2. On the right pane, select the ISA Server log you need, for example, Web Proxy Log. 3. From its shortcut menu, select Properties, on the Settings tab select Resolve IP addresses to and specify whether to resolve them into NetBIOS names, or DNS names: 6

Auditing Microsoft ISA Server Appendix A. InTrust Knowledge Pack for Microsoft ISAS/Proxy Server The Knowledge Pack for Microsoft ISAS/Proxy Server offers a set of predefined InTrust objects that will help you configure the gathering and monitoring of event data from your Microsoft ISA/Proxy Servers. The following objects are included: OBJECT TYPE Gathering policy Import policy Job Task Site OBJECTS ISAS: Security - collects all ISAS security events to both a repository and a database. ISAS: Health - collects all ISAS health events both to a repository and a database. ISAS: Usage: Proxy - collects ISAS Web Proxy log both to a repository and a database. ISAS: Usage: Firewall - collects ISAS Firewall log both to a repository and a database. ISAS: Security - imports all ISAS security events to a database. ISAS: Health - imports all ISAS health events to a database. ISAS: Usage: Proxy - imports events from ISAS Web Proxy log to a database. ISAS: Usage: Firewall - imports events from ISAS Firewall log to a database. ISAS Security events collection - collection of all the ISAS security events to the default repository and the default database. Weekly ISAS Web Proxy Reporting - weekly reporting of ISAS Web Proxy usage. Weekly ISAS Firewall Reporting - weekly reporting of ISAS Firewall usage. ISAS Daily collection - daily collection of all the ISAS security events to the default repository and the default database. ISAS Weekly Reporting - weekly reporting of ISAS Statistics and the most critical events. All ISA servers 7

Quest InTrust 10.3 Appendix B. InTrust for ISAS Reports This section briefly lists the categories of predefined InTrust reports that can be generated on event data collected from ISA Servers. For complete list of reports and report description refer to the InTrust 10.3 Reports for ISAS document. Security Advanced Forensic Analysis Common Security Incidents Requests by Network (chart) Usage Statistics ISA Firewall ISA Web Proxy 8

Auditing Microsoft ISA Server About Quest Software, Inc. Quest simplifies and reduces the cost of managing IT for more than 100,000 customers worldwide. Our innovative solutions make solving the toughest IT management problems easier, enabling customers to save time and money across physical, virtual and cloud environments. For more information about Quest go to www.quest.com. Contacting Quest Software Phone 949.754.8000 (United States and Canada) Email info@quest.com Mail Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA Web site www.quest.com Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a Quest product and have a valid maintenance contract. Quest Support provides unlimited 24x7 access to SupportLink, our self-service portal. Visit SupportLink at http://support.quest.com/ From SupportLink, you can do the following: Retrieve thousands of solutions from our online Knowledgebase Download the latest releases and service packs Create, update and review Support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: http://support.quest.com. 9

Quest InTrust 10.3 Third Party Contributions Quest InTrust, version 10.3 contains some third party components (listed below). Copies of their licenses may be found at http://www.quest.com/legal/third-party-licenses.aspx. COMPONENT LICENSE OR ACKNOWLEDGEMENT boost 1.32.0 Boost License version 1.0 CLucene 0.9 Apache version 1.1 This product includes software developed by the Apache Software Foundation (http://www.apache.org.) expat 1.95.5 MIT flex 2.5.4, 2.5.25, 2.5.27 flex 2.5.25/27 GNU standard C++ class library 3* GPL 2.0 with the "runtime exception" libdes 4.01 libdes 1.0 Net-SNMP 5.0.3 Net-SNMP OpenSSL 0.9.6g OpenSSL 1.0 This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/) SpiderMonkey 1.5* Netscape Public License ("NPL") 1.1 Stanford SRP 1.7.5 Stanford SRP This product includes software developed by Tom Wu and Eugene Jhong for the SRP Distribution (http://srp.stanford.edu/). This product uses the "Secure Remote Password' cryptographic authentication system developed by Tom Wu (tjw@cs.stanford.edu). ZLib 1.1.4 zlib 1.2.3 Copyright 1995-2005 Jean-loup Gailly and Mark Adler * a copy of the source code for this component is available at http://rc.quest.com. License agreement texts are provided in the Third Party Licenses HTML document. 10