1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Auditing Windows 2000 pptx

10 288 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 97,09 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Auditing Windows 2000 Auditing provides a means of tracking all events in Windows 2000 to monitor system access and ensure system security.. More specifi-cally, auditing enables you to t

Trang 1

Auditing Windows 2000

Auditing provides a means of tracking all events in

Windows 2000 to monitor system access and ensure system security

Auditing Overview

In Windows 2000, auditing provides a means of tracking events

and is an important facet of security for individual computers

as well as the enterprise As described in other chapters (notably Chapter 6, which covers the Event Viewer), Microsoft

defines an event as any significant occurrence in the operating

system or an application that requires users (particularly

administrators) to be notified Events are recorded in event logs that you can manage with the Event Viewer console

snap-in

Auditing enables you to track specific events More specifi-cally, auditing enables you to track the success or failure of

specific events For example, you might audit logon attempts, tracking who succeeds in logging on (and when) and who fails

at logging on Or, you might audit object access on a given folder or file, tracking who uses it and the tasks they perform

on it You can track an overwhelming variety of events in Windows 2000, as you’ll learn a little later in the chapter

Windows 2000 provides several categories of events you can audit The following list describes these event categories:

✦ Account Logon Events: Track user logon and logoff via a

user account

✦ Account Management: Track when a user account or

group is created, changed, or deleted; a user account is renamed, enabled, or disabled; or a password is set or changed

In This Chapter

Auditing Overview Configuring Auditing Examining the Audit Reports Enabling Auditing — Some Case Studies

Trang 2

✦ Directory Service Access: Track access to the Active Directory.

✦ Logon Events: Track non-local authentication events such as network use of a

resource or a remote service logging on using the local System account

✦ Object Access: Track when objects are accessed and the type of access

per-formed For example, track use of a folder, file, printer, and so on Configure auditing of specific events through the object’s properties (such as the Security tab for a folder or file)

✦ Policy Change: Track changes to user rights or audit policies.

✦ Privilege Use: Track when a user exercises a right other than those

associ-ated with logon and logoff

✦ Process Tracking: Track events related to process execution such as program

execution

✦ System Events: Track such system events as restart, startup, shutdown, or

events that affect system security or the security log

Within each category, you’ll find several different types of events — some common and some specific to the objects or events being edited For example, when you audit registry access, the events are very specific to the registry So rather than cover every possible event that can be audited, this chapter explains how to enable and configure auditing, and looks at specific cases and how auditing improves secu-rity and monitoring in those cases

Configuring Auditing

Configuring auditing can be either a one- or two-step process, depending on the type of events for which you’re configuring auditing For all but object access, enabling auditing simply requires that you define the audit policy for the given audit category You have an additional step for object access auditing, however, that is configuring auditing of specific objects For example, enabling auditing for

the policy Audit object access doesn’t actually cause any folders or files to be

audited Instead, you have to configure each folder or file individually for auditing

Enabling Audit Policies

Before you begin auditing specific events, you need to enable auditing of that event’s category You configure auditing through the computer’s local security pol-icy, group polpol-icy, or both If domain audit policies are defined, they override local audit policies This chapter assumes you’re configuring auditing through the local security policy If you need to configure auditing through group policies, use the Domain Security Policy console to enable auditing

Trang 3

To configure auditing through the local security policy, open the Security Policy console snap-in by choosing Start ➪ Programs ➪ Administrative Tools ➪ Local Security Policy Open the Security Settings/Local Policies/Audit Policy branch As Figure 19-1 illustrates, each audit policy category appears with its local setting and effective setting The effective setting reflects the application of group policies,

if any

Figure 19-1: Use either the local security policy or domain policy

to enable auditing

Double-click a policy to display its settings (Figure 19-2) You can enable auditing of both success and failure of events in the selected category Using the logon exam-ple given previously, for examexam-ple, you might audit successful logon to track who

is using a given system and when You might track unsuccessful logon to track attempts at unauthorized use of a system Select Success, Failure, or both, as desired, and then click OK

Figure 19-2: Select the types of events

(success or failure) for which you want to enable auditing

Trang 4

After you configure each category as desired, close the Security Policy console See the next section if you’re configuring auditing of object access Otherwise, audit events will begin appearing in the Security log Make sure you configure the Security log’s size and overflow behavior to accommodate the audit events

Auditing Object Access

The second step in configuring object access auditing is to enable auditing on the individual objects you want to monitor, such as folders, files, registry keys, and so

on You typically configure the objects where you find them in the UI, such as Explorer for folders and files, the Printers folder for printers, and Regedt32 for the registry keys The types of events you can audit for a given object depend on the object itself Events for file access, for example, are different to events for registry key access

See Chapter 23 for more information on controlling and monitoring printer access

To configure auditing for a folder or file, open Explorer and locate the object Right-click the object and choose Properties to view its property sheet Click Security ➪ Advanced to open the Access Control Settings dialog box Click the Auditing tab to show the Auditing page, then click Add Select a user, computer, or group that you want to audit, and click OK Windows 2000 displays an object dialog box that lists the events you can audit for the selected object (Figure 19-3)

Figure 19-3: Select Successful or Failed as

desired to configure auditing for each event type

Note

Trang 5

Select Successful for a given event if you want to record successful completion of the event Select Failed to monitor failed attempts The option “Apply these audit-ing entries to objects and/or containers within this container only” applies auditaudit-ing

to only the contents of the selected container (such as the files in the selected folder) The contents of subfolders are audited unless this option is selected

As you’re defining the audit policy for a selected object, keep in mind that you could potentially generate a huge number of events in the Security log Unless you have a specific reason to audit success on a given event, you should consider only auditing failure to reduce traffic to the log and load on the computer Auditing failed access is typically most useful for tracking attempts at unauthorized access

After you’re satisfied with the audit event selections, click OK Repeat the process

to add other users, groups, or computers to the list On the Access Control Settings dialog box (Figure 19-4), you’ll find two options that control how auditing entries are affected by the parent object and affect child objects:

Figure 19-4: Use the Auditing

page of the Access Control Settings dialog box to configure auditing for a selected object

✦ Allow inheritable auditing entries from parent to propagate to this object.

Select this option if you want auditing properties to be inherited by the cur-rent object from its pacur-rent object Deselect this option to prevent audit prop-erties from being inherited

✦ Reset auditing entries on all child objects and enable propagation of

inheritable auditing entries Select this option to clear and audit properties

configured within child objects (such as subfolders) and to allow the audit properties for the current object to propagate to child objects

Caution

Trang 6

Close the object’s property sheets when you’ve finished defining the audit policy for the object Auditing will begin immediately

Examining the Audit Reports

As explained previously, Windows 2000 records audited events to the Windows

2000 Security log You can use the Event Viewer console snap-in to view the event logs, save logs as log files for future viewing, and save the logs in either tab- or comma-delimited formats

Using the Event Viewer

You can use the Event Viewer console snap-in to view and manage the event logs

In addition to the Security log, you can manage the Application and System logs, as well as any additional logs created by Windows 2000 services or applications By default, the Event Viewer displays the logs dynamically, meaning new events are added to a log as you’re viewing it You also can save a log to disk to use as a bench-mark or simply to archive a log before clearing it Figure 19-5 shows the Security log

in the Event Viewer

Figure 19-5: You can browse the Security log (and others) using the

Event Viewer

For detailed information on the Event Viewer console snap-in, including how to save logs and configure log behavior, see Chapter 5

Cross-Reference

Trang 7

Using Other Tools

The Event Viewer provides the means through which you configure the event logs

as well as view them Because you can save a log to a text file, however, you can use other applications to view a log For example, you might save a log to a comma-delimited file so you can import the file into Microsoft Access or other database application to create a database you can easily organize by event ID, source, and so

on Or, you might export the data to a text file, and import it into a word processor

to create a report Just make sure you pick an application that can import tab- or comma-delimited files and export the log files in the appropriate format See also Chapter 20 for information on using the Alert services of the Performance Logs and Alerts console

A handful of other third-party tools exist for viewing a system’s log files One in particular worth considering is RippleTech’s LogCaster Providing a mechanism to manage the event logs is just a small part of what LogCaster does It not only pro-vides a unified interface for viewing the event logs, but it also serves as an excellent warning system for administrators LogCaster provides real-time monitoring of the event logs, services, TCP/IP devices, performance counters, and ASCII logs It pro-vides automatic delivery of alerts through a variety of mechanisms including pag-ing, e-mail, ODBC, SNMP, and others When a given event occurs, you can have LogCaster automatically notify you regardless of where you are Whether you’re tracking system performance, want to be notified of audit events, or want to be warned of a possible system intrusion, you’ll find LogCaster an excellent resource

You can locate RippleTech on the Internet at www.rippletech.com

Enabling Auditing

Although you could audit every event, doing so wouldn’t be practical because you’d place an undue load on the system and either end up with an enormous log file or spend all your time worrying about archiving the logs The following sections examine some specific situations and how you might employ auditing

Leaving Auditing Off

The first option is to leave auditing off altogether, and this is not a bad option in some situations If you’re not concerned with security, there’s no real reason to enable or perform auditing Turning off auditing reduces system overhead and helps simplify log management However, most organizations will or should be concerned with security at least to some degree, so this option might not fit your needs

Trang 8

Turning All Auditing On

At the other end of the auditing spectrum is complete auditing If you’re very con-cerned about security or shooting for C2 security certification, this might be an option However, bear in mind that your system will probably generate a huge num-ber of events requiring very active management of the security log As an alterna-tive to full logging, consider logging only failure events and not success events

Auditing Problem Users

Certain users, for one reason or another, can become an administrator’s worst nightmare In some cases, it’s through no fault of the user, but is instead due to problems with the user’s profile, account, and so on In other cases, the user can be

at fault, frequently using the wrong password, incorrectly typing the account name, trying to log on during periods when they are not allowed to, or even trying to access resources for which they have no permissions (or need) In these situations, you’ll want to monitor events associated with the given user and might even need

to retain the information for counseling or termination purposes

Which types of events you audit for a given user or group depends on the problem area For example, audit account logon events if the user has trouble logging on or attempts to log on during unauthorized hours Track object access to determine when a user or group is attempting to access a given resource such as a folder

or file Tailor other auditing to specific tasks and events generated by the user

or group

Auditing Administrators

Auditing administrators is a good idea, not only to keep track of what administra-tors are doing, but also to detect unauthorized use of administrative privileges Keep in mind, however, that auditing impacts system performance In particular, you should consider auditing account logon events, account management, policy change, and privilege use of an administrator only if you suspect an individual Rather, control administrators by delegating through the wise use of groups and organizational units

Auditing Critical Files and Folders

One very common use for auditing is to track access to important folders and files

In addition to tracking simple access, you probably will want to track when users make or attempt to make specific types of changes to the object such as Change Permissions and Take Ownership This helps you monitor changes to a folder or file that could affect security

Trang 9

Auditing enables you to monitor events associated with specific users, groups, ser-vices, and so on These events are recorded to the Security log The ability to moni-tor these events is not only useful for troubleshooting, but also is an important tool for monitoring and managing security You can keep tabs on the actions of specific users or groups and monitor attempts at unauthorized access to the system or its resources

Configuring auditing for most types of events is a one-step process You configure the policy for Success, Failure, or both in the local or group security policy under Security Settings\Local Policies\Audit Policy Configuring auditing of object access, such as monitoring access to folders/files, printers, or the registry, requires the additional step of configuring auditing on each object to be monitored

Ngày đăng: 17/01/2014, 08:20

TỪ KHÓA LIÊN QUAN

w