Module 9: Auditing Resources and Events
Introduction to Auditing |
- track the success and failure of events]
- Examples:
- when users logon
- attempts by a specific user to open a specific file
- changes to users and groups
- changes to security policy
- eliminate or minimize the risk of unauthorized use of resources
Planning an Audit Policy |
Note: To much auditing can create excessive overhead on the system. If your server is heavily used, you may need to keep auditing to a minimum.
Implementing an Audit Policy |
- An audit policy is set on a computer-by-computer basis ==> audit policies are only set locally
- Example: to audit User logon and changes made to user accounts on the PDC, you must set audit policy on PDC.
- Events are recorded in the local computers security log, but can be viewed from any computer by a user with administrative privileges to the computer where the events occurred.
- They can be viewed remotely with administrator privileges.
Auditing Requirements |
Defining an Audit Policy |
- Logon and Logoff --> user logged on or off.
- File and Object Access --> user accessed directory, file or printer.
- Use of User Rights --> user exercised a right.
- User and Group Management --> user account or group was created, changed or deleted. This includes password changes
- Security Policy Changes --> change was made to the user rights, audit or trust relationship policies
- Restart, Shutdown and System --> user restarted or shut down the computer or an event has occurred that affects system security or the security log. (e.g. the audit log fills up and entries are discarded)
- Process Tracking --> detailed tracking information for various events, such as program activation.
Auditing files and directories |
- Select folder or file in Windows NT Explorer and then click Properties in the File menu.
- Select Security tab and then Auditing button.
- For directory auditing, by default, auditing changes apply only to the directory and files, not sub folders. Make the following selections as needed:
- Replace Auditing on Subdirectories - to have auditing on subdirectories too.
- Replace Auditing on Existing Files - if you want to apply auditing changes to the directory only.
After this you can add users or groups and select in the Events to Audit box: ( know these baby)
- Read
- Write
- Execute
- Delete
- Change Permission
- Take Ownership
Auditing a Printer |
Events to audit (success or failure):
Using Event Viewer |
- Event Viewer provides info about errors, warnings, and successes or failure of a task.
- Info is stored in three types of logs:
- System --> contains errors, warnings or information generated by Windows NT. Selection of events is preset by Windows NT.
- Security --> contains info about success and failure of audited events. Events are recorded as result of your audit policy.
- Application --> contains error, warnings, or info generated by programs. Selection of events is preset by program developer.
Viewing Security Logs |
To view a log on a remote computer in another domain
Locating Events |
Click in Event Viewer on the View menu and click Filter Events or Find in the same menu. In Filter or Find dialog box select the criteria:
Archiving the Security Log |
In the Log menu you can select also Save As, Clear All Events, Open.
Best Practices |
Audit the Everyone Group instead of the Users Group - this means anyone who can connect to the network is audited. |
![]() I'm sorry, but I can't answer specific network-related, or exam-related questions. |
|
Last Updated: August 6, 2001 | Grant Wilson, Edmonton, AB Canada |