NT 110
Chapter 9
Auditing Resources and Events
In
this lesson we'll take a look at how we can audit various events on an NT
computer. We'll see how to implement a
Domain Audit Policy and how to view the audited events in the Event Log.
Introduction to Auditing
By
enabling auditing, we can assess the state of our network security. We can track users activities and system
wide events. We can also create reports
of these events. Examples of the things
we can audit:
1.
Actions
performed on the computer
2.
The
users that performed the actions
3.
And
the date and time when the actions were performed.
By
setting an audit policy, we select the types of events we want to keep track
of. After setting the audit policy we
can view the results in the Event Log.
When
we set an audit policy on a Domain Controller, we actually set the audit policy
for all the domain controllers (that includes PDC and all the BDCs).
When
we set an audit policy on a Workstation or Member Server, we are setting the
audit policy for only the individual workstation or member server.
Various
events we can audit include:
Ø
success
and failure of events
Ø
when
users have logged on
Ø
who
and when someone has accessed a file
Ø
any
changes that might have been made to permissions to a file or folder
Ø
any
changes that might have been made to the security policy
Ø
any
network connections that may have been established.
In
order to enable auditing on files and folders, those objects must be on NTFS
formatted partitions.
You
must be a member of the Administrators group or have the user right to Manage auditing and security log in
order to change or set auditing policies.
NOTE: Server Operators are not able
to create an audit policy, but they can view and archive security logs
Planning and Implementing the
Audit Policy
Consider
what level of security your organization requires. Based on your assessment of how high a level of security your
require, you then set up auditing policies.
To Track |
Consider Auditing |
Unauthorized
logon attempts |
Log
on and log off |
Unauthorized
attempts to use resources |
Use
of folder and files |
System
tasks performed by user |
Use
of user rights |
Changes
made to user/group accts |
User
and Group Management |
Changes
made to user rights/audit policy |
Security
policy changes |
Tampering
with a server |
Restart
and shut down of system |
Which
program users are using |
Process
tracking |
ü
Determine whether to audit success, failure or both.
By auditing success of events, you can assess how often a certain resource is
being used. Use the information for capcity planning (planning if you need to
make more space available on a server, or change from 10Mps ethernet to 100Mps
Ethernet. If you monitor the failure of
events will alert you to possible security breeches.
In minimum
security networks consider auditing:
1.
Successful
use of resources only if you need this information for planning purposes.
2.
Successful
use of sensitive and confidential data, such as payroll files. This will let you know the names of the
users who are actually using these files.
In medium
security networks, consider auditing:
1.
Successful
use of key resources. Again, this is
done for planning purposes.
2.
Successful
and unsuccessful administrative and security policy changes. This is to keep
tabs on users and Administrators. We
can keep track of when and who has changed to the security policies.
3.
Successful
use of sensitive and confidential data, such as payroll files.
In high
security networks, consider auditing:
1.
Successful
and unsuccessful user logons. This will
help to see if someone is try to hack a logon attempt
2.
Successful
and unsuccessful use of all resources
3.
Successful
and unsuccessful administrative and security policy changes.
WARNING: Auditing is a very processor
intensive task. This will slow down all
other processes on the machine which auditing has been implemented on. Only monitor as much, and as long as, you
have to. Then stop or reduce the
auditing.
Implementing the Audit Policy
You
can audit individual workstations, member servers, or domain controllers. You CANNOT audit the ENTIRE DOMAIN from a
central location.
Audited
events show up in the security log in the Event Viewer. Anyone with the adequate privileges can view
the security log on a local or remote computer.
Setting
up an auditing policy takes part in two phases:
1.
In
user manager (or user manager for domains) you select the events you wish to
audit
2.
After
specifying the types of events you want to audit, you then select the
resources, such as files, folders and printers, that you want to audit usage
of.
Defining the Audit Policy
These
are the types of events you can audit:
This event: |
Is used to track when: |
Logon
and Logoff |
User
log on or off OR makes or breaks a network connection |
File
and Object Access |
User
accesses a folder, file or printer. Set this to audit file or printer access |
Use
of user rights |
User
exercises a user right. (except logging in and out) |
User
and Group Management |
User
account or group is created, modified, deleted, or when account restrictions,
such as logon hours are modified |
Security
Policy Changes |
Change
is made to user rights, audit or trust policies |
Restart,
Shutdown, and System |
User
restarts or shutsdown system |
Process
Tracking |
Events
that cause programs to start |
Auditing Folders and Files
After
defining the system audit policies you must next decide which objects to
audit. You right click on the object
you want to audit, click on properties, and then click on the security
tab. Next, click the audit button.
For
the individual file, folder, or printer you can track the following:
1.
Read
2.
Write
3.
Execute
4.
Delete
5.
Change
Permissions
6.
Take
Ownership
Review
the chart on pg. 341 for the exact details of these audit events.
Auditing
the Everyone Group
So
far, we haven't found the Everyone group much help, mostly just deleting this
group when dealing with Share or NTFS permissions. However, when we're talking about auditing, the Everyone group is
the best group to audit! When you click
the Add button in the Auditing dialog box, select the everyone group, and then
you'll get a record of any account that has accessed the resource. Cool.
Auditing a Printer
You
audit a printer the same way you choose to audit file or folder usage. Right click the printer you want to audit in
the printers folder.
The
following table explains the printer auditing options:
Audit this event: |
To Track: |
Print |
Who
is printing. Bill dept's with this info |
Full
Control |
Who
is changing job settings, pausing, starting, resuming, sharing, stop sharing,
or changing printing properties. |
Delete |
Who
is deleting print jobs |
Change
Permissions |
Changes
to printer permissions |
Take
Ownership |
Changes
to printer ownership |
Using the Event Viewer to
View the Security Log
After
you've set a system audit policy, and defined the objects who's usage you want
to audit, you'll want to see the results.
You can find the results of your auditing in the Event Viewer. There are three logs in the event view:
1.
System Log. Gives you error, warnings,
and information gathered by NT operating system and 3rd party
components.
2.
Security Log. Information regarding the
audited events as you've set them in the audit policy.
3.
Applications Log. Errors, warnings, information
generated by programs. The developer of
the individual programs determines the reported events in the Event Log.
Administrative Requirements
for Viewing the Security Log
The
Security Log lives on the computer that the policy was set up on. You must be:
1.
An
Administrator
2.
Server
Operator
To
view the security log.
You
can also view the security logs from computers on other domains if the right
trust relationship is set up.
If
you want to view the security log on a remote computer, just open the Event
Viewer, click the Log Menu, and then click on computer. You can then select a computer from the
list.
Filtering Events
When
you open the Event Viewing you see ALL the records. If you're interested in see just a few records of interest, you
can filter the records. Click the View
Menu, then click on Filter Events
Locating Events
Use
Find on the View Menu to search for specific events. Find does NOT allow a search for dates, however.
Archiving the Security Log
You
can save old security logs so that you can audit events that took place
months/years ago. You want to archive
security logs on a regular basis because the security log can get very large,
very fast. This also let's up on drive
space used as well.
In
the Event Log Settings dialog box you can define how large you would like the
event log to get. You also make the
choice whether you want to Overwrite old events in order to save space, or
overwrite events older than X days,
or Not to ever overwrite the event log.
WARNING: If you decide to audit logon's, you MUST make sure that the event log
doesn't get full. If the security log
becomes full users will not be able to log on.
This is a security measure; if the system cannot keep track of who has
logged on, it will not let anyone log on.
This is bad, don't let it happen.
The
log size can be anywhere from 512k to 4GIG!
Best Practices:
ü
Audit
only those events you really need to know about; this will minimize the load on
your CPU
ü
In
a minimum security environment:
track successful events to determine resource usage.
ü
In
a medium security environment:
track successful and unsuccessful access; this will allow you to assess for
possible security breeches.
ü
In
a high security environment
track all successful and unsuccessful events
ü
Be
sure to track the Everyone Group!
ü
Set
aside a time everyday to check the Event Viewer. Often the system will warm you of things that you'll be able to
fix in advance before problems get so bad that the computer won't even start
anymore. You also want to be able to
assess on a daily basis whether a hacker attack may be taking place.
ü
Archive
you old logs and keep them in a save place.
Someday an Attorney or Management will ask you for these; stay out of
jail and keep them in a safe place.