MCSA/MCSE 70-290 Exam Prep: Managing and Maintaining a Microsoft Windows Server 2003 Environment (2nd Edition)
| Earlier in the chapter, we examined how to use the Event Viewer to work with various log files. Most of the other log files, such as the Application and System log files, can be viewed by all users. However, the Security log can be viewed only by administrators. You can make various configuration changes to the Security log, the most important of which is to increase the size of the log. The default size is 16,384KB, which is sufficient for light logging in small- to medium-sized organizations but becomes quickly filled in larger organizations that perform a lot of auditing. Although we covered how to manually increase the size of the event logs earlier in the chapter, it would be time consuming to make this change on every server in your enterprise. To make the configuration of the event logs consistent on the computers in your organization, you can create an Event Log Settings policy. This policy can be created via the Group Policy snap-in. After the policy is configured, it can be applied to the desired computers just like any other policy. To configure the Security log size for all computers in the domain, perform the procedure outlined in Step by Step 16.9.
Recording security events is used as a form of intrusion detection. When security auditing and the Security logs are configured properly, it is possible to detect some types of network break-ins before they succeed. An example of this is a password attack, which in a network with a good password policy can take some time to perform successfully. The Security log is also invaluable after a break-in has occurred, so you can track the movements and actions of the intruder and how he was able to enter your system. Above all, security logging is effective only if the network administrator takes the time to review it frequently.
|
Категории