Guardium7: Windows Event Log Capture All files needed for this exercise are in the TSE FTP Folder : Run script: read_events.pl:



Similar documents
Guardium Change Auditing System (CAS)

Application Monitoring for SAP

NIST Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Using Internet or Windows Explorer to Upload Your Site

NETWRIX EVENT LOG MANAGER

Enterprise Database Security & Monitoring: Guardium Overview

Real-Time Database Protection and. Overview IBM Corporation

Enterprise Security Solutions

Securely maintaining sensitive financial and

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER

8 Steps to Holistic Database Security

Installation Guide - Client. Rev 1.5.0

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Fax User Guide 07/31/2014 USER GUIDE

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

RSA Security Analytics

Find the Who, What, Where and When of Your Active Directory

PanelView Plus. Technology in the Spotlight

Keeping Tabs on the Top 5 Critical Changes in Active Directory with Netwrix Auditor

Windows Logging Configuration: Audit Policy Configuration

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

Trend Micro KASEYA INTEGRATION GUIDE

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Management Reporter Integration Guide for Microsoft Dynamics AX

WordPress Security Scan Configuration

<Insert Picture Here> Oracle Database Security Overview

Integrating LANGuardian with Active Directory

Dell Active Administrator 8.0

IBM Sterling Control Center

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Dell InTrust Preparing for Auditing Microsoft SQL Server

Pearl Echo Installation Checklist

GFI White Paper PCI-DSS compliance and GFI Software products

Advanced Configuration Steps

Kaseya 2. User Guide. Version 1.1

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Secret Server Qualys Integration Guide

SAP Operational Process Intelligence Security Guide

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

LT Auditor+ for Windows

Dell InTrust Real-Time Monitoring Guide

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

McAfee Enterprise Security Manager 9.3.2

File Management Utility User Guide

HIPAA Compliance Use Case

Enforcive /Cross-Platform Audit

RemoteLab 2.0 Admin Guide

Siebel HelpDesk Guide. Version 8.0, Rev. C March 2010

Quick Start Guide. IT Management On-Demand

High Availability Setup Guide

Propalms TSE Quickstart Guide

ScriptLogic File System Auditor User Guide

Release System Administrator s Guide

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.

SQL Server Automated Administration

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

Guide to Operating SAS IT Resource Management 3.5 without a Middle Tier

EVENT LOG MANAGEMENT...

Dell InTrust Auditing and Monitoring Microsoft Windows

Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

WHAT S NEW 4.5. FileAudit VERSION.

FUSION Installation Guide

Oracle Business Intelligence Answers, Delivers, and Interactive Dashboards User Guide. Version December 2006

Scheduling in SAS 9.4 Second Edition

Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision CyberSentry, Digital Energy, Multilin, and GE Multilin

TaskCentre v4.5 Run Crystal Report Tool White Paper

ADMINISTRATOR GUIDE VERSION

IBM InfoSphere Guardium Vulnerability Assessment

Setting up an MS SQL Server for IGSS

IBM InfoSphere Guardium Vulnerability Assessment

Vector Asset Management User Manual

This is a training module for Maximo Asset Management V7.1. It demonstrates how to use the E-Audit function.

Retail Deployment Guide. Microsoft Dynamics AX 2012 Feature Pack

SysPatrol - Server Security Monitor

Kaseya 2. User Guide. Version R8. English

BusinessObjects Enterprise XI Release 2 Administrator s Guide

SCCM 2012 Support Center Tool

CA SiteMinder SSO Agents for ERP Systems

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

Galaxy Software Addendum

AD Certificate Distribution

HP Client Automation Standard Fast Track guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

ImageNow Administrator Getting Started Guide

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

SevOne NMS Download Installation and Implementation Guide

Transcription:

Guardium7: Windows Event Log Capture Guardium V7 - July 2009 Rodrigo Bisbal Highlights: Detect Active Directory account events such as: user creation, modification & deletion, failed domain logins, logins, log outs, etc Detect SQL Server startup or shutdown Detect any critical other server application or security events. Send real time and correlation alerts Integrated Guardium reporting Integrated with Guardium Workflow Automation Help detect risky authentication patterns: failed logins, after hour logins, etc All files needed for this exercise are in the TSE FTP Folder : Goal To monitor crucial events from the Windows Event log and collect them on the Guardium system for centrzlized and automated auditing, alerting and reporting. We will focus on two typical scenarios: 1. Monitor Active Directory user activity 2. Monitor SQL Server Startup and Shutdown Step 1: Install ActivePerl ( Perl for Windows ) Get it from the TSE FTP account, under the Software folder or download from www.activestate.com Step 2: Test Event Viewer scripts from the CMD shell Create a directory on the Windows Server as C:\monitor-events Copy the two sample event reader scripts from the tse FTP account: read_events_id.pl read_events_sql.pl Open a cmd shell and try running the scripts. The output of should look like this: Run script: read_events.pl:

Run: read_events_sql.pl: Step 3: Create CAS Template Create a new CAS Template with these properties: Add To Set: Script To Monitor SQL Server Start/Stop:

Add To Set: Script To Monitor Active Directory User activity: Step 4: Install Template on CAS Host Go to Configure CAS host, select the Windows Server, make sure the CAS service is running, click on Modify : Click on Add, then Add the template created in Step 3 Monitor Event Logs, click Save :

Click on Refresh List and make sure you have 2 Monitored Items, or as many items as you had in the template: Step 5: Generate Activity Now go ahead and login to the Windows server and create a new domain user, this will be trigger an EventID=626 User Account Enabled and will be detected by the script read_events_id.pl. Please edit this script and add the event_id numbers that need to be detected. There is an event id for every action: new user, drop user, change password, failed login, etc. Also go ahead and Stop SQL server, this will be detected by the second script: read_events_sql.pl. Go ahead and open this script and you can see it is scanning the Application log for these strings: service started, SQL Server is now ready and Server is terminating. If you need to modify this, go ahead, but test it first on the CMD shell. Step 6: Create Reports Go to the Assess/Harden -> Change Reports tab, look for the CAS Saved Data report

If you don t have this tab, no worries, under the CAS domain look for the CAS Saved Data report and place it in your portal: CAS Saved Data Report: Double click to drill down and View Difference, see domain account mgamache was added

Or view report for SQL Server startup/shutdown:

Drill down and View Difference to see that SQL server was shutdown: Appendix A: sample event viewer scripts

1) Script to detect SQL Server Start/Stop #!c:\perl\bin\perl.exe # Guardium CAS script to detect SQL Server Start/Stop use strict; use Win32::EventLog; my $server = shift Win32::NodeName; ## CONFIG ## Set this to one of these EventLog types: ## Application, Security, System ## For SQL Server events use "Application" my $event_type = "Application"; \&GetEvents($server,$event_type); #---------------------------------------------------- # GetEvents() # Input: Server name, EventLog # Output: Log entries, to STDOUT #---------------------------------------------------- sub GetEvents { ## CONFIG ## Look at sample EventLog entries and identify the ## string to match under the Source column: ## For MSSQL use "MSSQLSERVER", or for failed logins and security events use "Security" ## my $search_source ="."; my $search_source ="MSSQLSERVER"; my($server,$log) = @_; my ($evt,$total,$oldest,$evthashref); my $start = 0; $evt = Win32::EventLog->new($log,$server) die "Could not open $log log on $server: $!\n"; $evt->getnumber($total) die "Can't get number of EventLog records: $!\n"; $evt->getoldest($oldest) die "Can't get number of oldest EventLog record: $!\n"; while ($start < $total ) { is terminating/ ) { $evt->read(eventlog_forwards_read EVENTLOG_SEEK_READ,$oldest+$start,$evtHashRef) or die "Can't read EventLog entry #$start\n"; my $eventid = (${$evthashref{eventid & 0xffff); my $source = ${$evthashref{source; my $recordnumber = ${$evthashref{recordnumber; my $timeg = localtime(${$evthashref{timegenerated); Win32::EventLog::GetMessageText($evtHashRef); my $msg = $evthashref->{message; if ( $source =~ /$search_source/ ) { $start++; ## CONFIG ## Even more filtering. If you are looking for specific ## message strings, enter them here: ## Match for SQL Server start/stop if ( $msg =~ /service started/ $msg =~ /SQL Server is now ready/ $msg =~ /SQL Server print "-" x 75; print "\n"; print "Source: $source\n"; print "RecordNumber: $recordnumber\n"; print "Time: $timeg\n"; print "Message: $msg\n"; print "Event_ID: $eventid\n"; 2) Script to audit AD user account events: #!c:\perl\bin\perl.exe

## Guardium CAS script to search EventLog by Event_ID use strict; use Win32::EventLog; my $server = shift Win32::NodeName; ## CONFIG ## Set this to one of these EventLog types: ## Application, Security, System ## my $event_type = "Application"; my $event_type = "Security"; \&GetEvents($server,$event_type); #---------------------------------------------------- # GetEvents() # Input: Server name, EventLog # Output: Log entries, to STDOUT #---------------------------------------------------- sub GetEvents { ## SET VARIABLES my($server,$log) = @_; my ($evt,$total,$oldest,$evthashref); my $start = 0; ## SEE BELOW FOR SAMPLE EVENT IDs ## THIS IS WHERE YOU CONTROL WHAT EVENTS TO LOOK FOR ## Add events to this list, separated by " ", example: n n n n n... my $event_ids = "642 626"; ## SAMPLE EVENT IDs ## 626 - User Account Enabled ( New Account ) ## 630 - Account Deleted ## 642 - User Account Changed ## 540 - Successful Network Logon ## 538 - User Log Off ## 517 - Audit Log was cleared $evt = Win32::EventLog->new($log,$server) die "Could not open $log log on $server: $!\n"; $evt->getnumber($total) die "Can't get number of EventLog records: $!\n"; $evt->getoldest($oldest) die "Can't get number of oldest EventLog record: $!\n"; while ($start < $total ) { $evt->read(eventlog_forwards_read EVENTLOG_SEEK_READ,$oldest+$start,$evtHashRef) or die "Can't read EventLog entry #$start\n"; my $eventid = (${$evthashref{eventid & 0xffff); my $source = ${$evthashref{source; my $recordnumber = ${$evthashref{recordnumber; my $timeg = localtime(${$evthashref{timegenerated); Win32::EventLog::GetMessageText($evtHashRef); my $msg = $evthashref->{message; if ( $eventid =~ /$event_ids/ ) { ## CONFIG ## Even more filtering. If you are looking for specific ## message strings, enter them here: ## if ( $msg =~ /match string 1/ $msg =~ /match string 2/ ) { print "-" x 75; print "\n"; print "Time: $timeg Source: $source RecordNumber: $recordnumber\n"; print "Event_ID: $eventid\n"; print "Message: $msg"; ## $start++; About the Guardium Platform Guardium s real-time database security and monitoring solution monitors all access to sensitive data, across all major DBMS platforms and applications, without impacting performance or requiring changes to databases or applications.

The solution prevents unauthorized or suspicious activities by privileged insiders, potential hackers, and end-users of enterprise applications such as Oracle EBS, PeopleSoft, Siebel, JD Edwards, SAP, Business Intelligence and in-house systems. Additional modules are available for performing database vulnerability assessments, change and configuration auditing, data-level access control and blocking, data discovery and classification, and compliance workflow automation. Forrester Research recently named Guardium a Leader across the board, with dominance and momentum on its side. Guardium earned the highest overall scores for Architecture, Current Offering and Corporate Strategy ( The Forrester Wave: Enterprise Database Auditing And Real-Time Protection, Q4 2007 by Noel Yuhanna, October 2007). About Guardium Guardium, the database security company, delivers the most widely-used solution for ensuring the integrity of enterprise information and preventing information leaks from the data center. The company s enterprise security platform is now installed in more than 450 data centers worldwide, including 3 of the top 4 global banks; 2 of the top 3 global retailers; one of the world s largest PC manufacturers; a global soft drink brand; and a leading supplier of business intelligence software. Founded in 2002, Guardium was the first company to address the core data security gap by delivering a scalable enterprise platform that both protects databases in real-time and automates the entire compliance auditing process. For more information, please contact your Guardium partner, Regional Sales Manager or visit www.guardium.com. Copyright 2009 Guardium. All rights reserved. Information in this document is subject to change without notice. Guardium, Safeguarding Databases, and S-TAP are trademarks of Guardium. All other trademarks and service marks are the property of their respective owners. VADS-PN 1108