MCSA/MCSE Self-Paced Training Kit (Exam 70-214): Implementing and Administering Security in a Microsoft Windows 2000 Network (Pro-Certification)

Lesson 3: Using Audit Policies

In this lesson, you will learn how to use audit policies to track authorized access to secure resources and the exercise of user rights. Auditing allows you to determine when valid users are misusing their authority or when hackers have maliciously made use of a valid user account.


After completing this lesson, you will be able to

Estimated lesson time: 30 minutes


Which Security Mechanisms Are Used in Auditing?

There are two entirely different theories of security in the world:

Neither theory works perfectly well by itself. Pure authorization systems cannot ensure that valid users won't cause harm, and pure accountability systems cannot prevent damage to critical resources, they can only allow events to be reconstructed so that the perpetrator can be held accountable. Both systems are used in the real world, and both systems are used in security for the Windows operating system.

How Auditing Works

The Windows operating system has extremely strong support for accountability through its support for auditing. Windows makes it possible for administrators to potentially record every action that a user makes in a system, from logging on or exercising user rights to reading and writing files.

The resulting list of activities is called an audit trail, and it creates a body of evidence that can be used to reconstruct a user's activities should it become necessary. The audit trail can also be used to search for anomalous activities, such as user account logon attempts during off hours or an extraordinary number of logon attempts across multiple accounts in a short period.

Auditing is managed and enforced similarly to permissions and rights in Windows. With the combination of permitted activities and user rights, it is possible to record virtually every activity that every user takes on the system.

For securable objects like files or registry keys, a special type of ACL called a system access control list (SACL) is contained in the object's security descriptor. Rather than specifying permissions for security principals, the ACEs in an SACL specify the activities that should be audited (recorded in the system log). You can audit every type of access that can be permitted. The security reference monitor makes audit log entries after it checks for proper permissions.

Just as normal permissions can permit or deny activities, auditing can record the success or failure of a potential operation. For example, you can choose to audit only successful logon attempts, only failed logon attempts, or both.

In addition to auditing file access, Windows 2000 can audit the exercise of user rights, such as the right to log on locally or interactively, or the right to take ownership of files. If you choose, every exercise of user rights can be recorded.

Identifying Audit Categories

The types of events you can audit are broken down into a number of categories, based on the services that audit events. For example, the security reference monitor is responsible for monitoring object access, while the WinLogon process is responsible for monitoring logon events. The following list describes the various audit categories:

Managing Auditing

To establish auditing for all of the various categories, you must enable audit policy in a GPO linked to either the local GPO or a domain or OU GPO. For most types of auditing, this is all that is necessary to begin recording audited activities in the security log. Audit policy is contained in the computer portion of the GPO, and it applies to all machines within the Active Directory container to which the audit policy GPO is linked.

For file system or printer access, you must enable auditing of object access and then create a SACL in the audited object's security descriptor. This process is very similar to setting permissions on the object and is handled through the Advanced section of the object's Security tab. To audit Active Directory object access, you must enable directory service access and then enable auditing on the specific objects you want to monitor.

All audit events are recorded in the computer's security log. To view audit information, use Event Viewer to read events in the security log. Figure 4.11 shows a server's security log with various audit log entries.

Figure 4-11. The security log records audited events

Avoiding Auditing Problems

There are downsides to the powerful recording capabilities of auditing:

Administering Auditing Activities

You must administer auditing judiciously by enabling the auditing of rare events that are potentially dangerous and which have a high likelihood of indicating abuse, while allowing routine activities and activities with low potential for abuse to go untracked.

Typically, administrators monitor:

When you enable auditing for relatively rare events, the audit mechanism will not create a noticeable load on your server.

Practice: Enabling Auditing

In this practice, you enable the auditing of easily abused user rights as well as accesses to the Information Technology folder in the domain.fabrikam.com domain.

Exercise 1: Auditing Log On and Log Off Attempts

In this exercise, you establish audit policy to monitor many user and administrative activities. These specific audit policies will not create a significant load on a server because they are relatively rare activities.

To establish audit policies for users and computers

  1. Open the Active Directory Users And Computers management console.

  2. Right-click domain.fabrikam.com, and choose Properties. Click the Group Policy tab shown in Figure 4.12, and double-click Domain Security Policy.

    Figure 4-12. The Group Policy tab

  3. In the Group Policies console, expand Domain Security Policy, Computer Configuration, Windows Settings, Security Settings, Local Policies, and click Audit Policy to view the various policies. See Figure 4.13.

    Figure 4-13. The Group Policies console

  4. Double-click Audit Account Logon Events, select Define These Policy Settings, select Failure, and click OK. The audit log will report account logon events that fail.

  5. Double-click Audit Logon Events, select Define These Policy Settings, select Failure, and click OK. The audit log will report logon events that fail.

  6. Double-click Audit Account Management, select Define These Policy Settings, select Success and Failure, and click OK. The audit log will report the creation of or change to any user account or group.

  7. Double-click Audit Policy Change, select Define These Policy Settings, select Success and Failure, and click OK. The audit log will report any attempts to change the GPO.

  8. Close the GPO, and click OK to close the Properties dialog box.

Exercise 2: Auditing File and Folder Permissions

In this exercise, you establish file and folder auditing for documents contained within a specific folder that stores highly sensitive information. All file activity in this folder will be monitored.

To enable file system object auditing

  1. Open the domain.fabrikam.com Domain Security Policy.

  2. Expand Domain Security Policy, Computer Configuration, Windows Settings, Security Settings, Local Policies, and click Audit Policy.

  3. Double-click Audit Object Access to open the Security Policy Setting dialog box as shown in Figure 4.14.

    Figure 4-14. Defining the policy for object access

  4. Select Define These Policy Settings, select Success and Failure, and click OK. The audit log will report any attempts to access the object.

  5. Close the GPO and any other open windows.

To set audit policy on a specific folder

  1. In Windows Explorer, browse to C:\Departments.

  2. Right-click Finance, and choose Properties.

  3. Click the Security tab, and click Advanced.

  4. Click the Auditing tab, and click Add.

  5. In the Select User, Computer, Or Group dialog box, double-click Everyone to open the Auditing Entry dialog box, as shown in Figure 4.15.

    Figure 4-15. Auditing Entry dialog box

  6. Select the Successful and Failed check boxes for

    • Create Files /Write Data

    • Create Folders /Append Data

    • Delete Subfolders And Files

    • Delete

    • Change Permissions

    • Take Ownership

  7. Click OK to finish setting Audit ACEs, click OK to close the Access Control Settings dialog box, and click OK to close the folder Properties dialog box.

Exercise 3: Monitoring the Audit Log

In this exercise, you create an audit trail by creating and deleting a file in the Finance folder. Once the audit trail is created, you can view the audit log.

To create an audit trail

  1. In Windows Explorer, browse to C:\Departments\Finance.

  2. Right-click in the folder, point to New, and choose Text Document.

  3. Type Finance Data.txt as the name of the document.

  4. Double-click Finance Data.txt to open the document.

  5. Type This is sample Data.

  6. Save and close the text document.

  7. Right-click Finance Data.txt, and choose Delete.

  8. Click Yes to confirm that you want to delete the text document.

  9. Close all open folder windows.

To view the audit log

  1. Click Start, point to Programs, point to Administrative Tools, and click Event Viewer.

  2. Click Security Log.

  3. Browse through the security log from the bottom up as shown in Figure 4.16. Find the event marking the creation of the file New Text Document.txt.

    Figure 4-16. Viewing the security log

  4. Browse through subsequent object access events.

    You will notice a delete event for the New Text Document.txt, which actually indicates that the file has been renamed. Subsequent audit log entries for this file will refer to it as Finance Data.txt.

  5. Browse up through subsequent object access events for the Finance Data.txt file.

    You will notice a write data event and a delete event for this file.

  6. Close the Event Viewer.

Lesson Review

  1. Why should you be judicious in your use of auditing rather than audit all possible events?

  2. How would you use auditing to determine if hackers are attempting to run a password list against the administrative account of a computer attached to the Internet?

  3. How would you use auditing to determine if an employee has been changing the reported hours worked in a Microsoft Excel spreadsheet after the accounting department has left at 5:00 P.M.?

  4. How does auditing prevent users from damaging files to which they have access?

Lesson Summary

Категории