Alert Logic Log Manager



Similar documents
PCI DSS Reporting WHITEPAPER

Log Management Best Practices: The Benefits of Automated Log Management

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Mapping EventTracker Reports and Alerts To FISMA Requirements NIST SP Revision 3 Prism Microsystems, August 2009

Enforcive /Cross-Platform Audit

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

Immotec Systems, Inc. SQL Server 2005 Installation Document

Security Correlation Server Quick Installation Guide

Differences between Computer and User Templates

Security Content Update Release Notes for CCS Update

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

Embarcadero Performance Center 2.7 Installation Guide

Enterprise SysLog Manager (ESM)

Upgrade Guide BES12. Version 12.1

Setup non-admin user to query Domain Controller event log for Windows2003

TestElite - Troubleshooting

Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Nexio Connectus Cluster Set Up with SQL Server Backend

QUANTIFY INSTALLATION GUIDE

Chapter 8 Monitoring and Logging

Connecting to the Firewall Services Module and Managing the Configuration

Video Administration Backup and Restore Procedures

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Integrating LANGuardian with Active Directory

Propalms TSE Quickstart Guide

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions

Avatier Identity Management Suite

Presented by Henry Ng

HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE

IBM Security QRadar SIEM Version MR1. Log Sources User Guide

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Security Correlation Server Quick Installation Guide

Enterprise Manager. Version 6.2. Installation Guide

TrueSight Operations Management Monitoring Studio

Historical Reporting Client (HRC) User Login Fails

Moving the TRITON Reporting Databases

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Configuring Logging. Information About Logging CHAPTER

How to monitor AD security with MOM

Changing Passwords in Cisco Unity 8.x

Synthetic Application Monitoring

Find the Who, What, Where and When of Your Active Directory

Secure Agent Quick Start for Windows

SQL Express to SQL Server Database Migration MonitorIT v10.5

Moving the Web Security Log Database

McAfee Database Activity Monitoring 5.0.0

TROUBLESHOOTING INCORRECT REPORTING OF THE WHO CHANGED PARAMETER

Hands-On Microsoft Windows Server 2008

Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?

SQL Express to SQL Server Database Migration Goliath Performance Monitor v11.5

Verax Service Desk Installation Guide for UNIX and Windows

Version 4.61 or Later. Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide.

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Integrating idrac 7 with Microsoft Active Directory

Getting Started With Delegated Administration

Oracle Enterprise Manager

Laboration 3 - Administration

McAfee Network Threat Response (NTR) 4.0

Knowledge Base Articles

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

Workflow Templates Library

FaxCore Ev5 Database Migration Guide :: Microsoft SQL 2008 Edition

The Project Management Software for Outlook, Web and Smartphone

System Area Management Software Tool Tip: Agent Deployment utilizing. the silent installation with Active Directory

RES ONE Automation 2015 Task Overview

Active Directory Self-Service FAQ

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Enterprise Manager. Version 6.2. Administrator s Guide

Integrating idrac7 With Microsoft Active Directory

4.0 SP1 ( ) November P Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2

Microsoft SQL Server Installation Guide

Network Monitoring & Management Log Management

HIPAA Compliance Use Case

Installation of MicroSoft Active Directory

Active Directory Change Notifier Quick Start Guide

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Diamond II v2.3 Service Pack 4 Installation Manual

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server

MaxSea TZ: Microsoft SQL Server problems End User

DigiVault Online Backup Manager. Microsoft SQL Server Backup/Restore Guide

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server.

Where can I install GFI EventsManager on my network?

NetBackup Backup, Archive, and Restore Getting Started Guide

Training module 2 Installing VMware View

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros

Oracle Enterprise Manager

1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS

PAYMENTVAULT TM LONG TERM DATA STORAGE

Virto Password Reset Web Part for SharePoint. Release Installation and User Guide

StreamServe Persuasion SP5 Control Center

NETWRIX IDENTITY MANAGEMENT SUITE

Transcription:

whitepaper Alert Logic Log Manager Configuring Log Sources for Best Practice Reports CONTENTS Introduction 1 Best Practice Reports in Log Manager 2 Active Directory 2 Databases 2 Network Devices 2 Windows Server (2008 R2, 2008, 2003) 2 UNIX/Linux 3 Configure Logging per Platform 4 Active Directory 4 Databases 4-5 Network Devices 6 Windows Server (2008 R2, 2008, 2003) 7 UNIX/Linux 7 1776 Yorktown, 7th Floor, Houston, TX 77056 877.484.838 info@alertlogic.com www.alertlogic.com Alert Logic and the Alert Logic logo are trademarks, registered trademarks, or service marks of Alert Logic Inc. All other trademarks listed in this document are the property of their respective owners. Documents are the property of their respective owners. 2013-2014 Alert Logic, Inc. All rights reserved.

Introduction A well-defined log management process enables organizations to deal with the large volumes of computer-generated log messages generated each day. By collecting, aggregating, parsing and analyzing these messages, you can better understand what s happening with systems in your IT environment and extract real value from the information for performance, security, compliance and other purposes. The purpose of this white paper is to outline a set of best practice reports that can be created from a repository of centralized log data and show the configuration steps needed to generate events for these best practice reports. The report and configuration examples come from Alert Logic Log Manager. Log Manager is a software-as-a-service based log management solution that collects, parses, and normalizes the millions of data points that are embedded in applications and IT infrastructure logs. Reports are presented back to you in an easily understandable, searchable format that can be used for compliance purposes or for further alerting of suspicious log activity. For more information on Log Manager, visit https://www.alertlogic.com/products-services/log-manager/. For more detail on configuring Log Manager to collect log data, documentation is available at http://docs.alertlogic.com/. > CONFIGURING LOG SERVICES FOR BEST PRACTICE REPORTS 1

Best Practice Reports Available in Alert Logic Log Manager Active Directory (AD) Active Directory Global Catalog Change The Microsoft Active Directory Global Catalog provides searchable information about every object controlled within your AD forest. Additionally, it provides the ability to search across multiple different domains without being required to access the AD for each domain directly. This report details all changes to the AD Global Catalog that are recorded as log messages. Active Directory Global Catalog Demotion The Microsoft Active Directory Global Catalog provides searchable information about every object controlled within your AD forest. Additionally, it provides the ability to search across multiple different domains without being required to access the AD for each domain directly. This report provides log message details each time a domain controller in your AD forest has been demoted, and can no longer serve the global catalog. Databases Database Failed Logins This report is generated to identify and display database login failure log messages received from all monitored hosts. This report is applicable to Oracle and SQL Server. Network Devices Network Device Failed Logins This report is generated to identify and display network device login failure log messages received from all monitored hosts. Network Device Policy Change This report is generated when a policy is added/changed/removed on network devices. Windows Server (2008 R2, 2008, 2003) Excessive Windows Account Lockouts This report is generated when a threshold of two log messages has been exceeded. The messages indicate that Windows user accounts have been locked out. Excessive Windows Account Lockouts by Administrative User This report is generated when a threshold of two log messages has been exceeded. The messages indicate that the Windows Administrator account has been locked out. Excessive Windows Failed Logins This report is generated to identify and display excessive Windows login failure log messages received from all monitored hosts with a threshold greater than five messages. Excessive Windows Failed Logins by Administrative User This report is generated when an excessive number of Windows login failure log messages are received from a single host for the Administrator account. The threshold is more than five messages. Windows FTP Failed Logins This report is generated when log messages indicate that accounts have failed to successfully login to IIS. Windows User Account Created This report is generated when log messages indicate that user accounts have been successfully created. Windows User Account Modified This report is generated when log messages indicate that user accounts have been modified (changed, created and deleted). Windows User Group Created This report is generated when log messages indicate that a user group has been created. Windows User Group Modified This report is generated when log messages indicate that user groups have been modified (changed, created and deleted). > CONFIGURING LOG SERVICES FOR BEST PRACTICE REPORTS 2

UNIX/Linux Failed UNIX Switch User Command This report provides details of all recorded failed uses of the UNIX switch user (su) command. UNIX Account Created This report is generated when log messages indicate the creation of UNIX accounts. UNIX Failed Logins This report is generated when log messages indicate that local and remote accounts have failed to successfully login. UNIX Group Created This report is generated when log messages indicate that a UNIX user group was added. UNIX SSH Failed Logins This report is generated to identify and display SSH login failure log messages received from all monitored hosts. UNIX Sudo Access This report is generated when a user has executed the UNIX sudo command. UNIX Switch User Command Success This report is generated when log messages indicate that a user has successfully executed the UNIX switch user (su) command. > CONFIGURING LOG SERVICES FOR BEST PRACTICE REPORTS 3

Configure Logging per Platform Active Directory To generate logs messages from Microsoft Active Directory, you need to make changes to the Audit Policy of a Domain Controller with a Domain Administrator login account. You can configure the Audit policy settings in the following location on the Domain Controller: Administrative Tools Domain Controller Security Policy Security Settings Local Policies Audit Policy There are nine different kinds of events you can audit. To generate meaningful log events that will populate the best practice reports above, here are the settings that should be configured: Success Failure Audit account logon events Audit account management Audit directory service access Audit logon events Audit object access Audit policy change Audit privilege use Audit process tracking Audit system events Databases MySQL MySQL logging configuration will vary based on the installed platform. The steps to enable logging for MySQL for Linux and Windows are outlined below. Linux Most current versions of MySQL have logging enabled by default. Check /var/log/ directory to ensure logging is enabled. Windows 1. Open the MySQL Administrator and connect to the MySQL server as an administrative user. 2. Click Startup Variables (Windows) or Options (Mac). The first step will be to enable logging, which can be done within this area of the application. 3. Enable login success and failure auditing. > CONFIGURING LOG SERVICES FOR BEST PRACTICE REPORTS 4

Microsoft SQL Server Microsoft SQL Server logging configuration is performed in both SQL Server Management Studio and Windows Audit Policy. The steps are outlined below.» SQL Server Management Studio 1. Connect to SQL Server in Object Explorer. 2. Right-click SQL Server Properties. 3. Go to Security page. 4. Select Both failed and successful logins under Login auditing section. 5. Click OK.» Once the above steps are followed to enable auditing within Miscrosoft SQL Server, you will also need to configure some settings at the Windows Server level. You can configure the Audit policy settings in the following location on the DB server: Administrative Tools Local Security Policy Security Settings Local Policies User Rights Assignment 1. Double click Generate security Audits. 2. Click Add User or Group. 3. Click Object Types Check Computers and click OK. 4. Type the name of the current database server into the Enter the object names to select field and click Check Names. 5. Once the computer name is resolved (it will display an underlined computer name), click OK. 6. Click OK to close the Generate security audits Properties window. Administrative Tools Local Security Policy Security Settings Local Policies Audit Policy 1. Double click Audit object access. 2. Select Success and Failure. 3. Close the Local Security Settings window. Microsoft SQL Server will start posting logs to the Application log of the server after the next reboot of the server. > CONFIGURING LOG SERVICES FOR BEST PRACTICE REPORTS 5

Network Devices Cisco ASA and PIX Firewall By default logging is disabled, and must be enabled.» Enable message logging: Begin sending logging messages to all configured destinations: FWSM 2.x PIX 6.x PIX 7.x Firewall(config)# logging on Firewall(config)# logging on Firewall(config)# logging enable» (Optional) Limit rate in which logging messages are generated: FWSM 2.x : Firewall(config)# logging rate-limit {unlimited number [interval]} {level level message message_id} You can rate-limit messages generated by using level keywords. Alert Logic recommends rate limiting notifications, informational and debugging (5-7): emergencies (0) alerts (1) critical (2) errors (3) warnings (4) notifications (5) informational (6) debugging (7) > CONFIGURING LOG SERVICES FOR BEST PRACTICE REPORTS 6

Juniper Firewall In /var/netscreen/guisvr/guisvr.cfg change the following: Find the following: guisvrmanager.auditlog_flag 0 guisvrmanager.auditlog_detail_flag 0 Change to the following: guisvrmanager.auditlog_flag 1 guisvrmanager.auditlog_detail_flag 1 Restart NSM services: /etc/init.d/guisvr restart If firewalls are configured for High Availability: Stop the secondary: /etc/init.d/hasvr stop Restart the primary: /etc/init.d/hasvr restart When the primary is started, Start the services on the secondary: /etc/init.d/hasvr start Windows Server (2008 R2, 2008, 2003) To generate log messages from standalone Windows servers, you need to make changes to the Audit Policy. You can configure the Audit policy settings in the following location on each server: Administrative Tools Local Security Policy Security Settings Local Policies Audit Policy There are nine different kinds of events you can audit. To generate meaningful log events that will populate the best practice reports above, here are the settings that should be configured: Success Failure Audit account logon events Audit account management Audit directory service access Audit logon events Audit object access Audit policy change Audit privilege use Audit process tracking Audit system events UNIX/Linux To generate log messages from UNIX/Linux servers, you need to use syslog. UNIX/Linux servers should already have this configured by default. > CONFIGURING LOG SERVICES FOR BEST PRACTICE REPORTS 7