The Institute of Internal Auditors Detroit Chapter Presents



Similar documents
Find the Who, What, Where and When of Your Active Directory

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Hands-On Microsoft Windows Server 2008

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Installation Instruction STATISTICA Enterprise Small Business

Getting Started with Tableau Server 6.1

Audit Policy Subcategories

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

ExhIBIT 1 User Manager and Users Group

Installation Instruction STATISTICA Enterprise Server

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

ACTIVE DIRECTORY DEPLOYMENT

Changing Passwords in Cisco Unity 8.x

Desktop Web Access Single Sign-On Configuration Guide

Installing Active Directory

Log Management and Intrusion Detection

Advanced Event Viewer Manual

How to install Small Business Server 2003 in an existing Active

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change

June 20, Copyright 2012 by World Class CAD, LLC. All Rights Reserved.

APPENDIX I Basic Windows NT Server 4.0 Installation and Configuration

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Installing the Microsoft Network Driver Interface

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

DC Agent Troubleshooting

Introduction. Versions Used Windows Server 2003

Integrating LANGuardian with Active Directory

Installation and Configuration of VPN Software

Audit account logon events

Windows BitLocker Drive Encryption Step-by-Step Guide

Installation Guide - Client. Rev 1.5.0

Connection to USOE Terminal Server 3/30/2006

NAS 206 Using NAS with Windows Active Directory

EVENT LOG MANAGEMENT...

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

How To Install And Configure Windows Server 2003 On A Student Computer

Understand Troubleshooting Methodology

Dream Report Version 4.5

Microsoft Windows Server 2008 Active Directory, Configuring

IIS, FTP Server and Windows

WINDOWS PROCESSES AND SERVICES

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

How to Manage a Windows NT Server Computer Remotely

Arkay Remote Data Backup Client Quick Start Guide

Windows Operating Systems. Basic Security

Magaya Software Installation Guide

Client for Macintosh

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

SOLAARsecurity. Administrator Software Manual Issue 2

NAS 253 Introduction to Backup Plan

FILE TRANSFER PROTOCOL (FTP) SITE

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Setting up an MS SQL Server for IGSS

EMC Celerra Network Server

Safewhere*ADFS2Logging

Netwatch Installation For Windows

Installation Notes for Outpost Network Security (ONS) version 3.2

Dialing Into Dartmouth With Windows 95/98

Brother Automatic Printing OPERATION MANUAL

LAB: Enterprise Single Sign-On Services. Last Saved: 7/17/ :48:00 PM

Selecting the Right Active Directory Security Reports for Your Business

Active Directory Change Notifier Quick Start Guide

Scan to SMB(PC) Set up Guide

Course: WIN310. Student Lab Setup Guide. Summer Microsoft Windows Server 2003 Network Infrastructure (70-291)

Create, Link, or Edit a GPO with Active Directory Users and Computers

SAPIP GUI INSTALLATION. Table of Contents

Manual Password Depot Server 8

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Maintaining the Content Server

Log Forwarder for Windows SolarWinds, Inc.

escan SBS 2008 Installation Guide

SIMATIC. SIMATIC Logon. User management and electronic signatures. Hardware and Software Requirements. Scope of delivery 3.

WhatsUp Gold v16.1 Installation and Configuration Guide

PLANNING AND DESIGNING GROUP POLICY, PART 1

Matisse Installation Guide for MS Windows. 10th Edition

Quick Start Guide for Parallels Virtuozzo

Domain Controller Failover When Using Active Directory

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

Pearl Echo Installation Checklist

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Operating System Installation Guide

Creating a Content Group and assigning the Encrypt action to the Group.

NetWrix USB Blocker. Version 3.6 Administrator Guide

Objectives. At the end of this chapter students should be able to:

EventTracker: Support to Non English Systems

Installation instructions for MERLIN Dashboard

eduroam Network guide configuration for Microsoft Windows 7

Group Policy 21/05/2013

Windows 7 Hula POS Server Installation Guide

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

RSA Event Source Configuration Guide. Microsoft Exchange Server

How IT Can Aid Sarbanes Oxley Compliance

Server Installation: ServerTools

Quick Start Guide. User Manual. 1 March 2012

KETS Enterprise VPN. Client Installation and Configuration Guide. Version 2.3

Transcription:

1 The Institute of Internal Auditors Detroit Chapter Presents 1

MOST Suitable for all categories business and personal presentation

3 If You Have Questions If you have questions during the webcast: If necessary, exit Full Screen View by pressing the Esc key Submit questions through the Ask a Question button Questions will be answered after the presentation portion is concluded

4 Earning CPE Credit In order to receive CPE credit for this webcast, participants must: Attend the webcast on individual computers (one person per computer) Answer polling questions asked throughout the webcast When answering polling questions, select your answer and the click Vote button (next to the Ask a Question button) to submit / save your answer. CPE certificates will be sent to the e-mail address on your BrightTALK account within two weeks of this webinar.

5 Please tell us your member status A) Member Detroit Chapter B) Member Central Region District 2 (Fort Wayne, Toledo, Michiana, W. Mich., Lansing) C) Member Other District D) Non-member

6 Windows Event Logs A brief description Event logs records significant events on your computer, such as when a user logs on to the computer or when a program encounters an error. Whenever these type of events occur, Windows records the event in an event log that you can read by using the Event Viewer application. Windows Event logs have been around since windows NT in (1993). Since Windows vista the Event logs have been updated and now conforms to an XML schema. We will cover Windows 7, Windows Server 2008, Windows Server 2012, Windows Vista.

7 TRUE/FALSE Windows event logs record all activity that occurs while it s in operation by default MOST www.companyname.com 2020 Companyname PowerPoint Business Theme. All Rights Reserved.

8 Starting Event Viewer Windows interface or the command line Windows interface Click the Start button. Click Control Panel. Click System and Maintenance. Click Administrative Tools. Double-click Event Viewer. Command line Open a command prompt. (To open a command prompt, click Start, click All Programs, click Accessories and then click Command Prompt). Type eventvwr..

9

10

11 What information appears in event logs? Event Viewer Application events. Events are classified as error, warning, or information, depending on the severity of the event. An error is a significant problem, such as loss of data. A warning is an event that isn't necessarily significant, but might indicate a possible future problem. An information event describes the successful operation of a program, driver, or service. Security-related events. These events are called audits and are described as successful or failed depending on the event, such as whether a user trying to log on to Windows was successful Setup events. Computers that are configured as domain controllers will have additional logs displayed here. System events. System events are logged by Windows and Windows system services, and are classified as error, warning, or information. Forwarded events. These events are forwarded to this log by other computers. Note: Some servers may have File Replication and DNS.

12 Windows Logs does not contain the category: Polling Question A. Application events B. Security-related events C. Internet Events D. Forwarded events

13 Event Properties Common Information in windows events Source - The software that logged the event, which can be either a program name or a component of the system or of a large program Event ID - A number identifying the particular event type. The first line of the description usually contains the name of the event type. For example, 6005 is the ID of the event that occurs when the Event Log service is started. User - The name of the user on whose behalf the event occurred. Operational Code - Contains a numeric value that identifies the activity or a point within an activity that the application was performing when it raised the event. For example, initialization or closing. Log - The name of the log where the event was recorded. Task Category - Used to represent a subcomponent or activity of the event publisher. Keywords - A set of categories or tags that can be used to filter or search for events.

14 Event Properties (cont.) Common Information in windows events Computer - The name of the computer on which the event occurred. Date and Time - The date and time that the event was logged. Level - A classification of the event severity. The classification for system and application logs are: Information, Warning, Error, Critical.. The classification for the security log are Success Audit or Failure Audit. Other Properties Process ID, Thread ID, Processor ID, Session ID, Kernel Time, User Time, Processor Time, Correlation Id, Relative Correlation Id

15 Create an audit Plan Decide what information is of value to your organization Decide what type of information you want to gain by collecting audit events Many Events are not audited by default, it is critical that you configure audit policies to fit your needs Consider the amount of resources that you have available for accumulating and reviewing an audit log. Audit events can take up space on your systems, There is little value in collecting huge amounts of audit data if there is no plan to use it Consider collecting a combination of Success and failure Audits, both can contain valuable information

16 TRUE/FALSE Auditing should be turned on for all events

17 Security Events Categories What Security categories can you audit? Account logon events - Audit this to see each instance of a user logging on to or logging off from another computer in which this computer is used to validate the account. Account management - Audit this to see when someone has changed an account name, enabled or disabled an account, created or deleted an account, changed a password, or changed a user group. Directory service access - Audit this to see when someone accesses an Active Directory directory service object that has its own system access control list (SACL). Logon events - Audit this to see when someone has logged on or off your computer (either while physically at your computer or by trying to log on over a network).

18 Security Events Categories (cont.) What Security categories can you audit? Object access - Audit this to see when someone has used a file, folder, printer, or other object Policy change - Audit this to see attempts to change local security policies and to see if someone has changed user rights assignments, auditing policies, or trust policies. Privilege use - Audit this to see when someone performs a user right. Process tracking - Audit this to see when events such as program activation or a process exiting occur. System events - Audit this to see when someone has shut down or restarted the computer, or when a process or program tries to do something that it does not have permission to do.

19 Recommended Event Logs to be monitored What Should I monitor? Event ID Event Type Description (4608 to 4612), (4614 to 4616) System Events Identifies local system processes such as system startup and shutdown and changes to the system time 4612 Audit Logs Cleared Identifies all the audit logs clearing events 4624 Successful User Logons Identifies all the user logon events 4625 Logon Failures Identifies all the failed user logon events 4634 Successful User Logoff's Identifies all the user logoff events

20 Recommended Event Logs to be monitored What Should I monitor? Event ID Event Type Description 4656, (4658 to 4664) Object Access Identifies when a given object (File, Directory, etc.) is accessed, the type of access (e.g. read, write, delete) and whether or not access was successful/failed, and who performed the action 4719 Audit Policy Changes Identifies all the changes done in the audit policy 4720, (4722 to 4726), Identifies all the changes done on an user account like user User Account Changes 4738, 4740 account creation,deletion, password change, etc. (4727 to 4737), (4739 to 4762) User Group Changes 4768, 4776 Successful User Account Validation 4771, 4777 Failed User Account Validation Identifies all the changes done on an user group such as adding or removing a global or local group, adding or removing members from a global or local group, etc. Identifies successful user account logon events, which are generated when a domain user account is authenticated on a domain controller Identifies unsuccessful user account logon events, which are generated when a domain user account is authenticated on a domain controller

21 Security information and event management SIEM Tools

22 TRUE/FALSE Event logs should only be analyzed after a security incident

23 Conclusions The importance of auditing in windows If audit settings are not properly configured, it may be impossible to determine what occurred during a security incident. Audit policy settings should support the organizational security policy and hold users accountable for their actions Audit policies should be reviewed on a regular basis to ensure adequate security measures are in effect Auditing is useless, if the audit data is not analyzed.

24 Questions?

25 Links View the systems audit policy - http://technet.microsoft.com/en-us/library/cc772576.aspx Security Audit Events for Windows 7 and Windows Server 2008 http://support.microsoft.com/default.aspx?scid=kb;en-us;947226

Please Take a Moment to Rate the Webinar 26 Click on Rate This Rate this webinar with 1 to 5 stars Provide any comments Click Send Rating Visit www.iiadetroit.org for additional information and registration details