Logo
CAR REVIEW
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Server

Windows Server 2008 R2 : Auditing the Environment (part 1) - Audit Policies

3/13/2011 3:58:23 PM
Auditing is a way to gather and keep track of activity on the network, devices, and entire systems. By default, Windows Server 2008 R2 enables some auditing, whereas many other auditing functions must be manually turned on. This allows for easy customization of the features the system should have monitored.

Auditing is typically used for identifying security breaches or suspicious activity. However, auditing is also important to gain insight into how the network, network devices, and systems are accessed. Windows Server 2008 greatly expanded auditing as compared with previous versions of Windows. As it pertains to Windows Server 2008 R2, auditing can be used to monitor successful and unsuccessful events on the system. Windows Server 2008 R2 auditing policies must first be enabled before activity can be monitored.

Audit Policies

Audit policies are the basis for auditing events on a Windows Server 2008 R2 system. Depending on the policies set, auditing might require a substantial amount of server resources in addition to those resources supporting the server’s functionality. Otherwise, it could potentially slow server performance. Also, collecting lots of information is only as good as the evaluation of the audit logs. In other words, if a lot of information is captured and a significant amount of effort is required to evaluate those audit logs, the whole purpose of auditing is not as effective. As a result, it’s important to take the time to properly plan how the system will be audited. This allows the administrator to determine what needs to be audited, and why, without creating an abundance of overhead.

Audit policies can track successful or unsuccessful event activity in a Windows Server 2008 R2 environment. These policies can audit the success and failure of events. The policies that can be monitored consist of the following:

  • Audit account logon events— Each time a user attempts to log on, the successful or unsuccessful event can be recorded. Failed logon attempts can include logon failures for unknown user accounts, time restriction violations, expired user accounts, insufficient rights for the user to log on locally, expired account passwords, and locked-out accounts.

  • Audit account management— When an account is changed, an event can be logged and later examined.

  • Audit directory service access— Any time a user attempts to access an Active Directory object that has its own system access control list (SACL), the event is logged.

  • Audit logon events— Logons over the network or by services are logged.

  • Audit object access— The object access policy logs an event when a user attempts to access a resource (for example, a printer or shared folder).

  • Audit policy change— Each time an attempt to change a policy (user rights, account audit policies, trust policies) is made, the event is recorded.

  • Audit privilege use— Privileged use is a security setting and can include a user employing a user right, changing the system time, and more. Successful or unsuccessful attempts can be logged.

  • Audit process tracking— An event can be logged for each program or process that a user launches while accessing a system. This information can be very detailed and take a significant amount of resources.

  • Audit system events— The system events policy logs specific system events such as a computer restart or shutdown.

The audit policies can be enabled or disabled through the local system policy, domain controller security policy, or Group Policy Objects. Audit policies are located within the Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy folder of the Group Policy Management Editor, as shown in Figure 1.

Figure 1. Audit policies and the recommended settings.

For the audit policies, the recommended settings are given in Table 1. These should be set on the Default Domain and Default Domain Controller GPOs. By default, all the policies are Not Defined. Figure 1 shows the recommended settings.

Table 1. Matching Audit Policies Recommended Settings
Audit PolicyRecommended Setting
Audit account logon eventsSuccess and Failure
Audit account managementSuccess and Failure
Audit directory service accessSuccess
Audit logon eventsSuccess and Failure
Audit object accessNot Defined
Audit policy changeSuccess
Audit privilege useNot Defined
Audit process trackingSuccess
Audit system eventsSuccess

The recommended settings are designed to address specific threats. These threats are primarily password attacks and misuse of privilege. Table 2 matches the threats to the specific audit policies.

Table 2. Matching Specific Threats to Audit Policy Recommended Settings
Threat AddressedAudit Policy
Random password attacksAudit account logon events (failures)
 Audit logon events (failures)
Stolen password attacksAudit account logon events (successes)
 Audit logon events (successes)
Misuse of privilegesAudit account management
 Audit directory service access
 Audit policy change
 Audit process tracking
 Audit system events

These recommended settings are sufficient for the majority of organizations. However, they can generate a heavy volume of events in a large organization. Or, there might be a subset of security events that an organization needs to track. In those cases, the next section discusses how to fine-tune the audit policy using audit policy subcategories.

Other -----------------
- Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 4)
- Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 3)
- Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 2)
- Windows Server 2003 : Configuring Zone Properties and Transfers - Exploring DNS Zone Properties (part 1)
- Windows Server 2008 R2 : Server Manager Storage Page
- Windows Server 2008 R2 : Server Manager Configuration Page
- Windows Server 2008 R2 : Server Manager Diagnostics Page
- Windows Server 2008 R2 : Server Manager
- Managing Windows Server 2008 R2 Roles and Features
- Windows Server 2008 R2 : Initial Configuration Tasks
- Going Green with Windows Server 2008 R2
- Windows Server 2003 : Configuring DNS Server Properties - Exploring DNS Server Properties Tabs
- Windows Server 2003 : Troubleshooting TCP/IP Connections (part 2)
- Windows Server 2003 : Troubleshooting TCP/IP Connections (part 1) - Faulty TCP/IP Configuration & Network Diagnostics
- Windows Server 2008 R2 :Task Scheduler
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 3)
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 2) - TCP/IP Tools
- Using the Debugging Tools Available in Windows Server 2008 R2 (part 1) - Best Practices Analyzer Tools
- Windows Server 2008 R2 : Logging and Debugging - Setting Baseline Values
- Windows Server 2003 : Analyzing Traffic Using Network Monitor (part 3) - Adding Parsers to Network Monitor
 
 
Most view of day
- Managing Windows 7 : Changing Indexing Options, Managing Your Credentials
- Windows Phone 8 : Messaging - Composing a New Message (part 4) - Removing a Message Attachment
- Deploying Applications Using Group Policy and SCCM 2007 : Creating Software Installation Policies
- Windows Server 2003 on HP ProLiant Servers : Migration Case Studies (part 1) - County Government Office
- Windows Server 2012 : Simplifying the Datacenter (part 3) - Improvements in Group Policy Management, IP Address Management
- Windows Server 2003 : Windows Firewall (part 3) - Service Pack Firewall Modifications - Modifying firewall behavior using the Windows Firewall INF file and unattend.txt
- Windows Server 2012 : Administering Active Directory using Windows PowerShell (part 2) - Finding Active Directory administration cmdlets
- Windows Phone 8 : Configuring Basic Device Settings - Date and Time (part 1) - Setting the Date and Time
- BizTalk Server 2010 : Installation of WCF SAP Adapter (part 2) - WCF-SAP Adapter vs WCF Customer Adapter with SAP binding
- Preparing Windows PE : Setting up the Environment
Top 10
- Microsoft Project 2010 : Linking Tasks (part 8) - Auditing Task Links,Using the Task Inspector
- Microsoft Project 2010 : Linking Tasks (part 7) - Creating Links by Using the Mouse,Working with Automatic Linking Options
- Microsoft Project 2010 : Linking Tasks (part 6) - Creating Links by Using the Entry Table
- Microsoft Project 2010 : Linking Tasks (part 5) - Creating Links by Using the Task Information Dialog Box
- Microsoft Project 2010 : Linking Tasks (part 4) - Entering Leads and Lags, Creating Links by Using the Menu or Toolbar
- Microsoft Project 2010 : Linking Tasks (part 3) - Using the Start-to-Start Relationship,Using the Finish-to-Finish Relationship
- Microsoft Project 2010 : Linking Tasks (part 2) - Using the Start-to-Start Relationship,Using the Finish-to-Finish Relationship
- Microsoft Project 2010 : Linking Tasks (part 1) - Defining Dependency Links
- Microsoft Project 2010 : Defining Task Logic - Manipulating Your Schedule
- Microsoft Lync Server 2013 : Director Troubleshooting (part 3) - Synthetic Transactions,Telnet
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro