File System Permissions Stealthaudit®
Total Page:16
File Type:pdf, Size:1020Kb
2021 StealthAUDIT® File System Permissions StealthAUDIT® TOC File System Permissions & Configuration Overview 5 Supported File System Platforms 5 Supported Windows Platforms 5 Supported Network Attached Storage Devices 6 Supported Unix Platforms 6 StealthAUDIT Console Server Permissions 8 File System Applet Deployment Permissions 9 File System Proxy Service Permissions 10 StealthAUDIT File System Scan Options 11 StealthAUDIT File Activity Auditing 14 Local Mode Scans 14 Firewall Rules for Local Mode Scans 15 Additional Firewall Rules for NetApp Data ONTAP Devices 15 Additional Firewall Rules for Windows File Servers 16 Applet Mode Scans 16 Firewall Rules for Applet Mode Scans 17 Proxy Mode with Applet Scans 18 Firewall Rules for Proxy Mode with Applet Scans 19 Additional Firewall Rules for NetApp Data ONTAP Devices 20 Additional Firewall Rules for Windows File Servers 21 Proxy Mode as a Service Scans: with RPC or Secure RPC 21 Firewall Rules for Proxy Mode as a Service Scans 23 Additional Firewall Rules for NetApp Data ONTAP Devices 24 Additional Consideration for Windows File Servers 25 Activity Monitor Configuration 26 Firewall Rules for Activity Monitoring 26 Doc_ID 354 2 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® Additional Firewall Rules for Dell EMC Unity, EMC Celerra, & EMC VNX Devices 26 Additional Firewall Rules for EMC Isilon Devices 27 Additional Firewall Rules for Nasuni Edge Appliances 27 Additional Firewall Rules for NetApp Data ONTAP 7-Mode Devices 27 Additional Firewall Rules for NetApp Data ONTAP Cluster-Mode Devices 28 Additional Firewall Rules for Panzura Devices 29 Dell EMC Unity Device Configuration for Access Auditing 30 Dell EMC Unity Device Configuration for Activity Monitoring 31 EMC Celerra & VNX Device Configuration for Access Auditing 32 EMC Celerra & VNX Device Configuration for Activity Monitoring 33 EMC Isilon Device Configuration for Access Auditing 34 EMC Isilon Device Configuration for Activity Monitoring 35 Hitachi Device Configuration for Access Auditing 36 Hitachi Device Configuration for Activity Monitoring 37 Nasuni Edge Appliance Configuration for Access Auditing 38 Nasuni Edge Appliance Configuration for Activity Monitoring 39 NetApp Data ONTAP 7-Mode Device Configuration for Access Auditing 40 Share Enumeration – API Calls for 7-Mode 40 Bypass NTFS Security for 7-Mode 40 NetApp Data ONTAP 7-Mode Device Configuration for Activity Monitoring 42 NetApp Data ONTAP Cluster-Mode Device Configuration for Access Auditing 44 CIFS Access Method #1 - Use FPolicy & ONTAP API 44 CIFS Access Method #2 - Use C$ Share 45 Access to NFSv3 Exports for Cluster-Mode 46 Doc_ID 354 3 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® NetApp Data ONTAP Cluster-Mode Device Configuration for Activity Monitoring 48 Panzura Device Configuration for Activity Monitoring 51 Unix Permissions for File System Scans 52 Windows File Servers 53 Windows File System Clusters 53 Least Privilege Permission Model for Windows Cluster 55 DFS Namespaces 55 Last Access Time (LAT) Preservation 55 Appendices 56 Appendix: Windows Permissions Explained 56 Policy Enumeration 56 Share & Share Permissions Enumerations 57 Folder Enumeration & NTFS Permissions 57 More Information 59 Doc_ID 354 4 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® File System Permissions & Configuration Overview Stealthbits products audit and monitor Microsoft® Windows® file servers and/or Network Attached Storage (NAS) devices. StealthAUDIT employs the File System Solution to execute Access Auditing (FSAA), Activity Auditing (FSAC), and/or Sensitive Data Discovery Auditing scans. The Activity Auditing (FSAC) scans also require Stealthbits Activity Monitor be deployed to monitor the target environment. Additionally, the Stealthbits Activity Monitor can be configured to provide activity data to StealthINTERCEPT, StealthDEFEND, and/or various SIEM products. This document describes the necessary settings required to audit and monitor the target environment and to allow for successful use of: l StealthAUDIT v11.0 l Stealthbits Activity Monitor v6.0 l StealthINTERCEPT v7.3 (Through integration with Stealthbits Activity Monitor) l StealthDEFEND v2.7 (Through integration with Stealthbits Activity Monitor) If running Sensitive Data Discovery (SDD) scans, it will be necessary to increase the minimum amount of RAM on the server where the Add-on is installed. By default, SDD scans are configured to run two concurrent threads. Each thread requires a minimum of 2 additional GB of RAM For example, if the job is configured to scan 8 hosts at a time with 2 concurrent SDD threads, then an extra 32 GB of RAM are required (8x2x2=32). Supported File System Platforms The versions and devices listed below are supported for Access Auditing, Activity Monitoring, and Sensitive Data Discovery Auditing. NOTE: Access Auditing and Sensitive Data Discovery Auditing support CIFS and NFSv3 (and below). Supported Windows Platforms StealthAUDIT for File Systems is compatible with scanning the following Microsoft® Windows® operating systems as targets: Doc_ID 354 5 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® l Windows Server 2019 l Windows Server 2016 l Windows Server 2012 R2 l Windows Server 2012 Supported Network Attached Storage Devices StealthAUDIT for File Systems is compatible with scanning the following Network Attached Storage (NAS) devices as targets: l Dell EMC Unity™ l EMC® Celerra® 6.0+ l EMC® Isilon® 7.0+ l EMC® VNX®: l VNX® 7.1 l VNX® 8.1 l Hitachi® 11.2+ l Nasuni® 8.0+ l NetApp® Data ONTAP®: l 7-Mode 7.3+ l Cluster-Mode 8.2+ NOTE: The Resiliency feature introduced in ONTAP 9.0 is not supported. l Panzura® 8.1 (Activity Monitoring only) Supported Unix Platforms StealthAUDIT for File Systems is compatible with scanning the following Unix operating systems as targets for Access Auditing (FSAA) and Sensitive Data Discovery Auditing only: l AIX® 4+ l Solaris™ 8+ l Red Hat® Enterprise Linux® 4+ Doc_ID 354 6 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® l Red Hat® Linux® 5.2+ l HP-UX® 11+ l CentOS® 7+ l SUSE® 10+ Doc_ID 354 7 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® StealthAUDIT Console Server Permissions In most cases the StealthAUDIT user is a member of the local Administrators group on the StealthAUDIT Console server. However, if the Role Based Access model of StealthAUDIT usage is employed, then the user assigned the role of Job Initiator (for manual execution) or the credential used for the Schedule Service Account (for scheduled execution) must have the following permissions to execute File System scans in local mode, applet mode, or proxy mode with applet: l Group membership in either of the following local groups: l Backup Operators l Administrators These permissions grant the credential the ability to create a high integrity token capable of leveraging the “Back up files and directories” from where the StealthAUDIT executable is run. Additionally, the credential must have WRITE access to the …\StealthAUDIT\FSAA folder in the installation directory. This is required by either the user account running the StealthAUDIT application, when manually executing jobs within the console, or the Schedule Service Account assigned within StealthAUDIT, when running jobs as a scheduled tasks. Doc_ID 354 8 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® File System Applet Deployment Permissions If executing the File System scans in either applet mode or proxy mode with applet, then the credential must have permissions to deploy and start the applet. Remember, the applet can only be deployed to a Windows server. Configure the credential(s) with the following rights on the proxy server(s): l Group membership in the local Administrators group l Granted the “Backup files and directories” local policy privilege l Granted the “Log on as a batch” privilege l If running FSAC, the service account in the credential profile requires access to the admin share (e.g. C$) where the sbtfilemon.ini file exists CAUTION: The local policy, “Network access: Do not allow storage of passwords and credentials for network authentication” must be disabled in order for the applet to start. Doc_ID 354 9 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED StealthAUDIT® File System Proxy Service Permissions If executing the File System scans in proxy mode as a service with RPC or secure RPC, then the File System Proxy Service should be installed on the Windows proxy server(s) prior to executing the scans. The version of the proxy service must match the major version of StealthAUDIT. The service can be run either as LocalSystem or with a domain account supplied during the installation of the File System Proxy Service with the following permission on the proxy server: l Membership in the local Administrators group l Granted the “Log on as a service” privilege (Local Security Policies > Local Policies > User Rights Assignment > Log on as a service) l If running FSAC, the service account in the credential profile requires access to the admin share (e.g. C$) where the sbtfilemon.ini file exists Additionally, the credential must have WRITE access to the …\StealthAUDIT\FSAA folder in the installation directory. NOTE: The File System Proxy Service can be installed ad hoc through a data collector configuration option. In that case, the credential in the