CHAPTER 9
AUDITING
RESOURCES AND EVENTS
Lesson 1:
Introduction to Auditing
331
Lesson 2: Planning
and Implementing the Audit Policy
334
Lesson 3: Using
Event Viewer to View the Security Log
. 346
Lesson 1:
Introduction to Auditing
Auditing is useful to track system activity and maintain Network security. You use a security log
to track entries that occur on the network.
The two kinds of Audit Policies:
that entire domain.
You can set up one Audit policy for a domain to:
make changes to user and group permissions, change the security policy, and make a
network connection.
trends is useful in determining the use of printers or files.
Audit Requirements:
Auditing can be done on any computer running Windows NT. However, to audit folders or
files they must be located on the NTFS Volume. You must have the following requirements:
policy is being set.
Manage Auditing and security log. This user right is granted to the Administrator group
by default.
NOTE: Members of the Server Operators group are unable to set up an Audit policy, but they can
administer security logs, perform tasks such as viewing and archiving them.
=====================================================================
wntadm9.html PAGE
2
2001/11/01
Lesson Summary:
activities and system-wide events on a network.
security events that will be recorded and will appear in the security log.
policy applies only to that specific computer.
Lesson 2:
Planning and Implementing the Audit Policy
Here is a list of some events to audit for your network:
=====================================================================
To track Consider
auditing
=====================================================================
Unauthorized logon attempts Users logging on and off
Unauthorized attempts to use resources Use of folder and file resources
System tasks performed by a user User of user rights
Changes made to user and group accounts User and group management
Changes made to the user rights or Security policy changes
Audit policy
Tampering with a server Restarting or shutting down the system
Which program users are using Process tracking.
=====================================================================
say successful access to the printer by users can help you plan resources. Tracking
failures can help track security breaches.
data.
======================================================================
wntadm7.html PAGE 3
2001/11/01
data, changes to security policies.
and administrative and security policy changes.
IMPORTANT Auditing uses up a lot of Hard disk space, so only use if for useful information.
Implementing an Audit Policy
To audit events that occur primarily on the PDC you must audit only the PDC. So in summary the
audit must be done on the hardware being audited.
Events are recorded in the local computers security log, be they can be viewed from any computer
who has administrative privileges on the computer on the computer where the vents occurred.
There are two steps in setting
up an Audit:
Defining the Audit Policy by selecting the events in audit in User Manager for domains
Specifying the files, folders and printers to audit and the users and groups that you want to track.
You can use Windows NT Explorer to specify the folder and file events to audit.
Defining Domain Audit Policy
You must select the audit events you want in the User Manager for Domains. See the following list:
======================================================================
This event Is used to track when
======================================================================
Logon and Logoff Logging on or off or breaks a network
Connection
File and Object Access Accessing a folder, file or printer that is set
For auditing.
Use of User Rights A user exercises a right.
User and Group A user account or group is created, modified
Management deleted or when account restrictions, such as
logon hours and workstation restrictions,
are modified.
Security Policy A change is made to the user rights,
Changes audit or trust relationship policies.
Restart, shutdown and system A user restarts or shuts down the computer
Causing an event to occur that affects system
Security.
Process Tracking Evens occur that cause programs to start for
Example, selecting a program on the Start
Menu, or clicking a link on a Web page that
Starts a Setup program.
========================================================================
wntadm7.html PAGE
4
2001/11/01
NOTE: If you set up an Audit policy on a computer running Windows NT Workstation or on a
member server, you use User Manager. All Audit Policy dialog box options in User Manger are
identical to those in User Manager for Domains.
Auditing Files or Folders
Once you define the Audit Policy, you must specify the folders or files to audit. To gain access
to the Directory Auditing in Windows NT Explorer, right-click the folder and file, click Properties,
click the Security tab, and then click Auditing. Look in the book Page 340, expands on the
selection.
Auditing the Everyone Group
the computer, including those who connect as Guest. Do the following to Audit a file:
Start Windows NT Explorer and expand the Labfiles\Public\Library folder.
Bronte Properties dialog box appears.
no security tab, the selected file is not on an
NTFS partition.
NOTE: You can easily remove a user or group from auditing by selecting its name and then
clicking Remove.
========================================================================
wntadm7.html PAGE
5
2001/11/01
Auditing a Printer:
Setting up auditing a printer is similar to files and folders. First you define the Audit Policy and
then you specify the printer evens to audit, and the users and groups you want to track to the
printer. To gain access to the Printer Auditing
Printer, Properties and Security tab,
Auditing.
=====================================================================
Audit this event To
Track
=====================================================================
Print Printer usages. Great for billing certain departments
Full Control Changes to job settings, pausing, restarting, moving
Or deleting documents, This is useful in high speed
Networks.
Delete Delete Print jobs. Great in high-security networks.
Change Changes to printer permissions, Medium and high-
Permissions Security networks.
Take Ownership Changes to printer ownership. Medium and high-
Security networks.
=====================================================================
Lesson Summary:
========================================================================
wntadm7.html PAGE 6
2001/11/01
computer, then specify the folder or file and printer events to audit, then
specify the users and groups whose use of the resources you want to track.
just its use by domain users.
Lesson 3:
Using Event Viewer to View the Security Log
Event Viewer provides information about errors, warnings and the successes or failures of tasks.
There are three types of logs:
System log. Contain errors, warnings, and information generated by Windows NT and third-party
components, such as a NIC driver.
Security log. Success and failures of audited events. The events that are recorded are the result of
your Audit policy.
Application Log. Contains errors, warnings, or information generated by programs, such as a
database or e-mail program. The selection of events that are recorded is present by the program
developer.
The Event Viewer is located off the main menu, Programs/Administrative Tools (common)/Event
Viewer. The Event Viewer is saved in three different ways:
How to Audit:
*****KNOW where all selections are in the Menu **** for
tests.
Administrative requirements for Viewing the Security Log
To view a security log, you must be a member of the Administrators or Server Operators group
on the computer where the security
log resides. If the Audit policy was
set on the PDC, you
========================================================================
wntadm7.html PAGE
7
2001/11/01
must have administrative
privileges on the PDC. Dont forget if
you want to view the
security log on a
computer in a different domain, the appropriate trust relationship must
exit.
Security logSuccessful events appear with a key icon, unsuccessful events appear with a lock icon.
Filtering Events:
By default, Event Viewer lists all events recorded in the selected log. Click Filter Events/
View menu.
Filtering has no effect on the actual content of the log, it changes only the view.
Locating Events:
You have the access to find a file in the View Menu. You can search for event based dates.
Archiving Security Log
You can track trends by archiving event logs. Helps develop resource use and plan for growth.
Lesson Summary:
running Windows NT.
these you are auditing) of each audited event.
group on the computer where the security log resides. If the computer is in a different
the security log when you start Even Viewer.
in planning for growth.
BEST PRACTICES:
dont forget it uses a lot of hard drive space.
resource use. In high-security network track all successful events.
security breaches. In high-security track all unsuccessful events.
accounts for in the domain.
administration tasks.
use and for planning purposes.