Auditing File and Folder Access



Similar documents
Controlling and Managing Security with Performance Tools

Active Directory 2008 Operations

Protecting Data with a Unified Platform

Maximizing Your Desktop and Application Virtualization Implementation

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Streamlining Web and Security

Mitigating Risks and Monitoring Activity for Database Security

Quickly Recovering Deleted Active Directory Objects

Eradicating PST Files from Your Network

Becoming Proactive in Application Management and Monitoring

Virtual Machine Environments: Data Protection and Recovery Solutions

The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway

Understanding & Improving Hypervisor Security

Tips and Best Practices for Managing a Private Cloud

How Configuration Management Tools Address the Challenges of Configuration Management

Protecting Data with a Unified Platform

Using Web Security Services to Protect Portable Devices

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Isolating Network vs. Application Problems

How to Install SSL Certificates on Microsoft Servers

Steps to Migrating to a Private Cloud

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices Edition Don Jones

How to Install SSL Certificates on Microsoft Servers

Real World Considerations for Implementing Desktop Virtualization

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

Why Endpoint Encryption Can Fail to Deliver

Account Access Management - A Primer

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Art of High Availability

Maximizing Your Desktop and Application Virtualization Implementation

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

Collaborative and Agile Project Management

How to Use SNMP in Network Problem Resolution

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures

Dell InTrust Preparing for Auditing Microsoft SQL Server

Data Protection in a Virtualized Environment

Active Directory Change Notifier Quick Start Guide

FOR WINDOWS FILE SERVERS

Maximizing Your Desktop and Application Virtualization Implementation

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

Dell InTrust Preparing for Auditing and Monitoring Microsoft IIS

The Business Case for Security Information Management

Spotlight Management Pack for SCOM

How to Install SSL Certificates on Microsoft Servers

The Next-Generation Virtual Data Center

What Are Certificates?

Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan

Beyond the Hype: Advanced Persistent Threats

Lab 05: Deploying Microsoft Office Web Apps Server

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Realizing the IT Management Value of Infrastructure Management

The Evolving Threat Landscape and New Best Practices for SSL

Dell One Identity Cloud Access Manager How to Configure for High Availability

Security Explorer 9.5. User Guide

4.0. Offline Folder Wizard. User Guide

Symantec Enterprise Vault Technical Note. Troubleshooting the Monitoring database and agents. Windows

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

January 23, 2010 McAfee SaaS Continuity User Guide

Automated Database Backup. Procedure to create an automated database backup using SQL management tools

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones

Dell InTrust Preparing for Auditing Cisco PIX Firewall

Pr oactively Monitoring Response Time and Complex Web Transactions Working with Partner Organizations... 2

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

Dell Statistica Statistica Enterprise Installation Instructions

Scribe Demonstration Script Web Leads to Dynamics CRM. October 4,

Dell Statistica Document Management System (SDMS) Installation Instructions

How To Protect Your Active Directory (Ad) From A Security Breach

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

CommVault Simpana Archive 8.0 Integration Guide

Transcription:

The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields

Au diting File and Folder Access... 1 Auditing Considerations... 1 Co nfiguring Auditing... 2 Command Line Auditing... 3 Mining the Security Event Log... 4 Centralized Auditing and Reporting via Third Party Tools... 5 i

Copyright Statement 2009 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers or its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via e-mail at info@realtimepublishers.com. ii

Auditing File and Folder Access The third rail of effective file server security is all about assurance. Assuring that the right users have access to data preserves availability. Assuring that everyone else stays out preserves security. Assuring that permissions on files and folders are always correctly set preserves compliance. Auditing access to Windows Server 2008 file servers is the primary mechanism through which this assurance is achieved. Auditing enables administrators to verify that security controls put in place are working properly, all the while logging access and modifications to controlled files. Auditing can be enabled via the Windows Explorer GUI, command prompt tools, and Group Policy. Like reporting on access controls, the auditing process is per server and the logging of controlled events is done to the local event log. A correctly developed auditing system provides a number of benefits to the organization. It assists in securing the enterprise by determining inappropriate access to files or folders. It provides for the maintenance of a modification history across data, applications, and operating system (OS) configurations. And it creates the necessary documentation for meeting regulatory standards. Auditing Considerations The first step in deciding to audit file server access is determining what type of events to audit. For many IT organizations, the selection of auditing categories is often defined by internal security organizations in cooperation with applicable rules of regulatory compliance. Although each compliance regulation is uniquely different in its guidance, all generally require that user and administrator actions are tracked into an auditable database. For some, that database can be your Windows servers Event Logs. The first step in this process is to designate a purpose to each audit rule. Auditing rules have several typical purposes. They can assist in securing the enterprise by determining inappropriate access to files or folders. Auditing also allows the maintenance of a modification history outside of any application specific modification tracking. This linkage between auditing rules and business goals is critically important, as there can be unintended effects when purposes are not designated to an audit rule. The first of these relates to collected events that do not further the organization s goals. Collecting these events consumes resources, leads to log maintenance issues, and makes event filtering dramatically more difficult. Therefore, discretion is required when developing an audit policy so that only the appropriate types of access tracking are monitored. The second unintended effect stems from possible legal exposure. Your organization s legal counsel should review your auditing strategy. Their legally focused review helps to ensure that the auditing purpose covers potential exposure and that the policy is defensible. 1

Note In short, your audit policy should collect the minimum amount of auditing information that is necessary to accomplish your business goals. Windows Server 2008 provides for auditing on folders as well as individual files. File and folder auditing can monitor access to both simple as well as special permissions as discussed in the first article of this series. For each object, assigned auditing rules can monitor for success and/or failure in exercising the users permissions. As with permissions, it is important to remember that auditing configurations are also inheritable. Thus, if extensive auditing is set up and allowed to pass down the settings to a large number of files, a great number of audit entries could be generated. Configuring Auditing Auditing must first be globally enabled before setting auditing rules on individual files and folders. Doing this across multiple machines in an environment is most commonly accomplished via Group Policy. Navigate to Computer Configuration Policies Windows Settings Security Settings Local Policies Audit Policy, as shown in Figure 1. Here, edit the Audit Object Access policy to allow the tracking of Success and/or Failure events. Figure 1: Enabling auditing via Group Policy. Once the global audit policy is enabled, configuring auditing on individual files and folders can be performed using Group Policy, Windows Explorer, or command line tools. As with the global policy, leveraging Group Policy for individual file and folder configuration ensures a comprehensive approach. Right click Computer Configuration Policies Windows Settings Security Settings File System, and select Add File to add a file or folder to the policy (see Figure 2). 2

Figure 2: Configuring auditing of NTFS access. After entering the file path, click Edit Security to bring forward the same Security wizard you re used to seeing when managing permissions directly in the file system. Click Advanced, and select the Auditing tab of the Advanced Security Settings window to configure audit settings using the GUI. Command Line Auditing Audit configuration from the command line is possible using the same Windows PowerShell Get ACL cmdlet discussed earlier in this series. Get ACL is used to retrieve the existing audit policy using PowerShell by supplying the audit command line switch: Get ACL c:\users\administrator\tools\ audit Select Object ExpandProperty Audit To use PowerShell to create an audit rule, the Set ACL cmdlet is required: $AclToModify = Get ACL Path c:\users\administrator\tools Audit $NewAudit = New Object System.Security.AccessControl.FileSystemAuditRule( MyLocalDomain\gshields, ReadDa ta, Success ) $ AclToModify.AddAuditRule($NewAudit) Set ACL Path c:\users\administrator\tools ACLObject $AclToModify PowerShell provides a rich mechanism for scripting the creation of audit rules; however, effectively using it requires familiarity with the.net Framework classes that manage access to the file system rules. 3

Mining the Security Event Log After auditing has been configured, success or failure events will be stored in the Security event log. Event log entries are stored per server, so be conscious of each server s maximum log size and how the event log is configured to react when the log size is reached. Depending on the size of the log file and the number of events, there is a danger of losing audit entries due to log size maximums being reached. Note Windows Server 2008 includes a feature called Event Log Forwarding, which allows file servers to centralize event log data onto a single server. This server can be configured to pull the event logs from the other servers or those servers can pass selected events to the central server. More information on Event Log Forwarding can be found at http://technet.microsoft.com/en us/library/cc748890.aspx. Gathering log information is only the first step. Effectively mining event log data for meaningful events requires extra effort. With the release of Windows Server 2008, Event Viewer provides several filtering options that limit the data being presented In Figure 3, you can see how a few specific settings can greatly enhance the quality of information viewed from the Security log: Logged. For a general purpose file system auditing log, this can be set at Any time. Event Level. All security audit entries will be Informational, so this filter is of relatively little use. Event Logs. All the entries dealing with auditing are contained in the Security event log. Event Sources. Microsoft Windows security auditing should be selected here. Task Category. Here, select the File System option. Keywords. The Keywords option is of little use, as all security audit entries contain the keywords Audit Success or Audit Failure. 4

Figure 3: Event Viewer s filtering options. Once filtered, reporting from the Event Viewer is quite limited. A selection of events can be saved to XML, text, or comma separated value files, but there is no facility for rich reporting. Additionally, reporting efforts can be hampered by the limitations of event log storage. In the most gracious scenario where all old event logs cannot be maintained in the current view, the events are archived and those archives would need to be searched individually in order to obtain information from them. Centralized Auditing and Reporting via Third Party Tools Auditing is all about assurance, but assuring effective auditing with native tools alone is a challenge. As you can see, configuring auditing via Windows Explorer or Windows PowerShell requires a number of steps and careful coordination to be effective. Each and every file share must be managed as an individual item, which increases the chance for errors or omissions in auditing. Although Group Policy assists this process, the natural dynamics of an IT environment mean that Group Policies must be regularly verified to ensure their policies remain correct over time. 5

IT environments with large numbers of file shares, large amounts of file storage, or highsecurity requirements may find that native solutions are insufficient for their needs. To meet regulatory compliance and provide timely security information, you may find the need to turn to third party toolsets. Their extended capabilities enable the central configuration of an audit plan, central storage of audit data, customizable reporting, alerting in the case of unauthorized access, and enhanced search features that are often necessary as environments scale. 6