The Institute of Internal Auditors Detroit Chapter Presents

Total Page:16

File Type:pdf, Size:1020Kb

The Institute of Internal Auditors Detroit Chapter Presents 1 The Institute of Internal Auditors Detroit Chapter Presents http://www.securelyyoursllc.com/ 1 Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. MOST Suitable for all categories business and personal presentation 3 If You Have Questions… If you have questions during the webcast: – If necessary, exit Full Screen View by pressing the Esc key – Submit questions through the “Ask a Question” button – Questions will be answered after the presentation portion is concluded http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 4 Earning CPE Credit In order to receive CPE credit for this webcast, participants must: . Attend the webcast on individual computers (one person per computer) . Answer polling questions asked throughout the webcast . When answering polling questions, select your answer and the click “Vote” button (next to the “Ask a Question” button) to submit / save your answer. CPE certificates will be sent to the e-mail address on your BrightTALK account within two weeks of this webinar. http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 5 Please tell us your member status A) Member Detroit Chapter B) Member – Central Region District 2 (Fort Wayne, Toledo, Michiana, W. Mich., Lansing) C) Member – Other District D) Non-member http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 6 Windows Event Logs A brief description Event logs records significant events on your computer, such as when a user logs on to the computer or when a program encounters an error. Whenever these type of events occur, Windows records the event in an event log that you can read by using the Event Viewer application. Windows Event logs have been around since windows NT in (1993). Since Windows vista the Event logs have been updated and now conforms to an XML schema. We will cover Windows 7, Windows Server 2008, Windows Server 2012, Windows Vista . http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 7 TRUE/FALSE Windows event logs record all activity that occurs while it’s in operation by default www.CompanyName.com MOST © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. 8 Starting Event Viewer Windows interface or the command line Windows interface Command line . Click the Start button. Open a command prompt. (To open a command prompt, click Start , click All Programs , click . Click Control Panel . Accessories and then click Command Prompt) . Click System and Maintenance . Type eventvwr . Click Administrative Tools . Double-click Event Viewer . http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 9 http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 10 http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 11 What information appears in event logs? Event Viewer . Application events. Events are classified as error, warning, or information, depending on the severity of the event. An error is a significant problem, such as loss of data. A warning is an event that isn't necessarily significant, but might indicate a possible future problem. An information event describes the successful operation of a program, driver, or service. Security-related events. These events are called audits and are described as successful or failed depending on the event, such as whether a user trying to log on to Windows was successful . Setup events. Computers that are configured as domain controllers will have additional logs displayed here. System events. System events are logged by Windows and Windows system services, and are classified as error, warning, or information. Forwarded events. These events are forwarded to this log by other computers. Note: Some servers may have File Replication and DNS . http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 12 Windows Logs does not contain the category: Polling Question A. Application events B. Security-related events C. Internet Events D. Forwarded events http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 13 Event Properties Common Information in windows events . Source - The software that logged the event, which can be either a program name or a component of the system or of a large program . Event ID - A number identifying the particular event type. The first line of the description usually contains the name of the event type. For example, 6005 is the ID of the event that occurs when the Event Log service is started. User - The name of the user on whose behalf the event occurred. Operational Code - Contains a numeric value that identifies the activity or a point within an activity that the application was performing when it raised the event. For example, initialization or closing. Log - The name of the log where the event was recorded. Task Category - Used to represent a subcomponent or activity of the event publisher. Keywords - A set of categories or tags that can be used to filter or search for events. http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 14 Event Properties (cont.) Common Information in windows events . Computer - The name of the computer on which the event occurred. Date and Time - The date and time that the event was logged. Level - A classification of the event severity. The classification for system and application logs are: Information, Warning, Error, Critical. The classification for the security log are Success Audit or Failure Audit. Other Properties Process ID, Thread ID, Processor ID, Session ID, Kernel Time, User Time, Processor Time, Correlation Id, Relative Correlation Id http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 15 Create an audit Plan Decide what information is of value to your organization . Decide what type of information you want to gain by collecting audit events . Many Events are not audited by default, it is critical that you configure audit policies to fit your needs . Consider the amount of resources that you have available for accumulating and reviewing an audit log. Audit events can take up space on your systems, There is little value in collecting huge amounts of audit data if there is no plan to use it . Consider collecting a combination of Success and failure Audits, both can contain valuable information http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 16 TRUE/FALSE Auditing should be turned on for all events http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 17 Security Events Categories What Security categories can you audit? . Account logon events - Audit this to see each instance of a user logging on to or logging off from another computer in which this computer is used to validate the account. Account management - Audit this to see when someone has changed an account name, enabled or disabled an account, created or deleted an account, changed a password, or changed a user group. Directory service access - Audit this to see when someone accesses an Active Directory® directory service object that has its own system access control list (SACL). Logon events - Audit this to see when someone has logged on or off your computer (either while physically at your computer or by trying to log on over a network). http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 18 Security Events Categories (cont.) What Security categories can you audit? . Object access - Audit this to see when someone has used a file, folder, printer, or other object . Policy change - Audit this to see attempts to change local security policies and to see if someone has changed user rights assignments, auditing policies, or trust policies. Privilege use - Audit this to see when someone performs a user right. Process tracking - Audit this to see when events such as program activation or a process exiting occur. System events - Audit this to see when someone has shut down or restarted the computer, or when a process or program tries to do something that it does not have permission to do. http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 19 Recommended Event Logs to be monitored What Should I monitor? Event ID Event Type Description Identifies local system processes such as (4608 to 4612), (4614 to System Events system startup and shutdown and changes 4616) to the system time 4612 Audit Logs Cleared Identifies all the audit logs clearing events 4624 Successful User Logons Identifies all the user logon events 4625 Logon Failures Identifies all the failed user logon events 4634 Successful User Logoff's Identifies all the user logoff events http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 20 Recommended Event Logs to be monitored What Should I monitor? Event ID Event Type Description Identifies when a given object (File, Directory, etc.) is accessed, 4656, (4658 to 4664) Object Access the type of access (e.g. read, write, delete) and whether or not access was successful/failed, and who performed the action 4719 Audit Policy Changes Identifies all the changes done in the audit policy 4720, (4722 to 4726),
Recommended publications
  • Attack Tactics 7! the Logs You Are Looking For
    Attack Tactics 7! The Logs You Are Looking For © Black Hills Information Security @BHInfoSecurity Brought To You By! © Black Hills Information Security| @BHInfoSecurity Brought To You By! Just type “‘Demo,<script>alert(document.cookie);</script> or ‘ 1=1;--” into the Questions box DEMO will work fine too…. © Black Hills Information Security| @BHInfoSecurity Brought To You By! https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to- active-defense-cyber-deception-and-hacking-back-14124 © Black Hills Information Security| @BHInfoSecurity © Black Hills Information Security| @BHInfoSecurity Problem Statement © Black Hills Information Security @BHInfoSecurity JPcert to the rescue… Sort of.. © Black Hills Information Security @BHInfoSecurity A helpful diagram Forensics Testing Defense © Black Hills Information Security @BHInfoSecurity Executive Problem Statement Basic Questions: ● Are our tools working? ● What can we detect? ● How can we test this? ● What are our gaps? ● What existing tools can fill them? ● What do we have to buy? ● Can we buy ourselves out of this problem? © Black Hills Information Security @BHInfoSecurity TryingA helpful to diagramtie it all together Forensics Testing Defense © Black Hills Information Security @BHInfoSecurity Adventures in (just enabling proper) Windows Event Logging Important Event IDs ● 4624 and 4634 (Logon / Logoff) ● 4662 (ACL’d object access - Audit req.) ● 4688 (process launch and usage) ● 4698 and 4702 (tasks + XML) ● 4740 and 4625 (Acct Lockout + Src IP) ● 5152, 5154, 5156, 5157 (FW
    [Show full text]
  • Teradici Remote Workstation Card Agent for Windows
    Teradici PCoIP Remote Workstation Card Agent for Windows Documentation Teradici PCoIP Remote Workstation Card Agent for Windows Documentation This documentation is intended for administrators who are installing the Remote Workstation Card Agent for Windows as part of a Teradici Remote Workstation Card system. It assumes thorough knowledge of conventions and networking concepts, including firewall configuration. Although many agent features and settings can be configured using the Windows user interface, some administrative tasks require use of Windows command line tools. Users should be familiar with both cmd and PowerShell. About the PCoIP Remote Workstation Card Agent for Windows The PCoIP Remote Workstation Card Agent for Windows introduces Teradici brokering to a Teradici Remote Workstation Card deployment, allowing the desktop to be managed by Teradici Cloud Access Manager or by third-party brokers like Leostream. A complete PCoIP Remote Workstation Card deployment includes these components: • A physical host machine, which provides the desktop to remote clients. See System Requirements for more information. • A PCoIP Remote Workstation Card installed on the host machine. • The PCoIP Remote Workstation Card software for Windows installed on the host machine. • The Remote Workstation Card Agent for Windows installed on the host machine. About PCoIP Licensing When the Remote Workstation Card Agent for Windows is installed, the Remote Workstation Card can be licensed using a Remote Workstation Card license. With this flexibility, you can
    [Show full text]
  • Accessdata Forensic Bootcamp
    Windows Forensics—Vista Forensic Toolkit, FTK Imager and Registry Viewer Advanced • One-day Instructor-led Workshop his one-day AccessData® workshop follows up on the AccessData T Windows® Forensic Training by covering the Microsoft® Windows Vista operating system. It provides the knowledge and skills necessary to use AccessData tools to conduct forensic investigations on Vista systems. Participants learn where and how to locate Vista system artifacts using AccessData Forensic Toolkit® (FTK®), FTK Imager, Registry Viewer®, and Password Recovery Toolkit® (PRTK®). During this one-day workshop, participants will review the following: GUID Partition Tables (GPT): Students will use FTK Imager to navigate the new GPT formatted drive partitioning scheme. File Structure Changes: Students will learn the mechanics of reparse and mount points in the Windows Vista file structure. BitLocker Full Volume Encryption (FVE): Students will use FTK Imager and Windows Vista technology to decrypt and acquire a sector-by-sector image of an FVE drive. Windows Vista feature changes such as: - Recycle Bin - Structure and Content Changes - Thumbcache - Reparse Points - Link and Spool Files - Vista File Structure - Windows Event Logs - Vista Registry Entries, PSSP, and IntelliForms data - Updated SuperFetch Structure - New Locations for Old Windows Artifacts - Enhanced Thumbs.db Functionality - Device Identification and Protection - Vista security model The class includes multiple hands-on labs that allow students to apply what they have learned in each module.
    [Show full text]
  • Red Teaming for Blue Teamers: a Practical Approach Using Open Source Tools
    SESSION ID: LAB4-W10 Red Teaming for Blue Teamers: A Practical Approach Using Open Source Tools Travis Smith Manager, Security Content and Research Tripwire, Inc @MrTrav #RSAC #RSAC Agenda 14:00-14:10 – Access Learning Lab Virtual Environment 14:10-15:00 – Run Through Red Team Activities 15:00-16:00 – Run Through Blue Team Activities #RSAC Accessing the Lab https://tripwire.me/vhX X will be you’re specific student number on your desk Password: rsalearninglab OS Credentials: rsa/learninglab OS Hostname: host-X OS IP Address: 10.0.0.X 3 #RSAC Log Into SkyTap https://tripwire.me/vh1 rsalearninglab #RSAC Launch Victim Host Console Username: rsa Password: learninglab #RSAC #RSAC Today’s Red Team Toolset #RSAC Today’s Blue Team Toolset Elastic Stack Windows Sysmon Kibana Beats Elasticsearch @SwiftOnSecurity #RSAC Disable Windows Defender* Start Menu > Settings > Update & Security Click Windows Security on left side menu Click Virus & threat protection Click Manage settings Turn Off: – Real-time protection – Cloud-delivered protection #RSAC Red Team Exercise #1 https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1088/T1088.md #RSAC Red Team Exercise #1 Launch Event Viewer, confirm it launches #RSAC Red Team Exercise #1 Run atomic command – reg add hkcu\software\classes\mscfile\shell\open\command /ve /d ”C:\Windows\System32\cmd.exe” /f #RSAC Red Team Exercise #1 Launch Event Viewer, confirm CMD.exe launches Launch other executables from here: • notepad • calc • whoami • ping #RSAC Red Team Exercise #2 https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1015/T1015.md
    [Show full text]
  • LIFENET® AED Event Viewer
    LIFENET ® AED Event Viewer User guide Contents Overview ..................................................................................................................2 What is LIFENET AED Event Viewer? ..........................................................................................2 How does it work? ..........................................................................................................................2 What can I do with it? ....................................................................................................................2 Before you start ....................................................................................................2 Use cases .........................................................................................................................................2 IT requirements ..............................................................................................................................2 Getting started ........................................................................................................2 Starting LIFENET AED Event Viewer ...........................................................................................2 Calibrating the screen .....................................................................................................................3 Working with LIFENET AED Event Viewer ........................................................3 Receiving cases ...............................................................................................................................3
    [Show full text]
  • Event Log Explorer Help
    Welcome to Event Log Explorer Help This help system is a place to find information about Event Log Explorer. Introduction Concept Event Log Explorer basics License agreement © 2005-2018 FSPro Labs. All rights reserved. Introduction Event Log Explorer is a software for viewing, monitoring and analyzing events recorded in Security, System, Application and other logs of Microsoft Windows operating systems. It extends standard Event Viewer monitoring functionality and brings new features. Main features of Event Log Explorer: Multiple-document or tabbed-document user interface depending on user preferences Favorites computers and their logs are grouped into a tree Viewing event logs and event logs files Merging different event logs into one view Archiving event logs Event descriptions and binary data are in the log window Event list can be sorted by any column and in any direction Advanced filtering by any criteria including event description text Quick Filter feature allows you to filter event log in a couple of mouse clicks Log loading options to pre-filter event logs Switching between disk and memory for temporary data storing Fast search by any criteria Fast navigation with bookmarks Compatibility with well-known event knowledgebases Sending event logs to printer Export log to different formats Multiple-document or tabbed-document user interface depending on user preferences Event Log Explorer provides you with 2 user interface types. Multiple- document interface (MDI) allows you to open unlimited number of event logs and place them all inside the main window of Event Log Explorer. Tabbed-document interface (TDI) allows you to open unlimited number of event logs and features the best way of navigation between logs.
    [Show full text]
  • INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8
    INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8 INFORMATION TECHNOLOGY CONCEPTS (391) —OPEN EVENT— REGIONAL – 2019 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS _________ (100 points) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards. No more than sixty (60) minutes testing time Property of Business Professionals of America. May be reproduced only for use in the Business Professionals of America Workplace Skills Assessment Program competition. INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 2 of 8 MULTIPLE CHOICE Identify the choice that best completes the statement or answers the question. Mark A if the statement is true. Mark B if the statement is false. 1. Which of the following appears on the right side of any Windows 8 screen when you move your pointer to a right corner? A. Live tile B. Memory Manager C. Charms bar D. System tray 2. Which element of the Windows 7 GUI gives windows a glassy appearance, but also consumes more hardware resources? A. Control panel B. Aero user interface C. Charms interface D. Logic interface 3. The top of a top-down hierarchical structure of subdirectories is called which of the following? A.
    [Show full text]
  • Event Logs What Are Event Logs?
    Event Logs What are event logs? Windows keeps track of almost everything that happens in the operating system Microsoft defines an event as "any significant occurrence in the system or in a program that requires users to be notified or an entry added to a log." Examples of events are log ons, log offs, connections to wireless access points, improper shut downs of the computer, installations of programs, etc Windows Event Logs ● What is actually recorded in the event log is dependent on the applications involved and the system settings ● Security event logging is disabled by default on most freshly installed windows sysstems. ● If they exists, event logs cad be incredibly useful, they would provided both local and network context that is difficult to replicate with other artifacts. Event Log Analysis ● What Happened?: Event ID ->Event Category->Description ● Date/Time?: Time Stamp ● Users involved?: User Account->Description ● Systems Involved?:Hostname->IP Address ● Resources Accessed?: Files->Folders->Printers->Services Event Analysis Cont. ● What Happened? ○ Even logs are designed to provide very specific information about activities that occurred on the system. ○ Items like Event IDs and Event Categories help to find relevant events ○ Event Description can provide more information of its nature ● Date/Time? ○ Timestamps are key in event logs. ○ The provide a temporal context of the events ○ Can also help narrow an investigators focus. Event Log Analysis Cont. ● Users Involved? ○ Everything done within Windows is done using the context of an account ○ We can: ■ Identify references to specific users ■ Information about the Windows OS activities via special accounts like System and NetworkService.
    [Show full text]
  • Monitoring Windows Event Logs
    Monitoring Windows Event Logs Monitoring Windows Event Logs Using OpManager The Windows event logs are files serving as a placeholder of all occurrences on a Windows machine. This includes logs on specific occurrence on the system, an application or the operating system. Be it an incorrect login attempt, a hack, an application failure, or a system failure- all these happenings are 'logged' here, helping troubleshoot a fault, and also monitor the system's health. All Windows events include information on the occurrence such as the event time, the source of the event, the type of fault, and a unique ID for the event type. The event logs contain a wealth of information, which helps an administrator troubleshoot and manage the system. The Event Viewer utility on the Windows device helps in viewing all the events on that machine. Why should Event Logs be monitored? Prevention is better than cure. This applies perfectly for network monitoring too! In this era of the Internet, where hacking is commonplace, being a smart proactive administrator is a must. Securing network information, ensuring data integrity, assuring 100% uptime of important services etc is critical to business. Juggling with multiple tools to address different monitoring needs only compounds to the stress. Let us consider the following two possibilities: 1. Daily Backup Periodic backup of your network data is the first step for disaster recovery. Assume you have an application like Veritas doing the backup job for you. Ensuring a smooth backup is a critical task, specially, in environments where you hold important customer data. It needs little imagination to say what will happen if the backup fails and you end up finding it out only the next morning! 2.
    [Show full text]
  • Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic
    ® CompTIA Security+ Lab Series Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic CompTIA Security+® Domain 3 - Threats and Vulnerabilities Objective 3.6: Analyze and differentiate among types of mitigation and deterrent techniques Document Version: 2013-08-02 Organization: Moraine Valley Community College Author: Jesse Varsalone Copyright © Center for Systems Security and Information Assurance (CSSIA), National Information Security, Geospatial Technologies Consortium (NISGTC) The original works of this document were funded by the National Science Foundation’s (NSF) Advanced Technological Education (ATE) program Department of Undergraduate Education (DUE) Award No. 0702872 and 1002746; Center for Systems Security and Information Assurance (CSSIA) at Moraine Valley Community College (MVCC). This work has been adapted by The Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48. The National Information Security, Geospatial Technologies Consortium (NISGTC) is authorized to create derivatives of identified elements modified from the original works. These elements are licensed under the Creative Commons Attributions 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. The Network Development Group (NDG) is given a perpetual worldwide waiver to distribute per US Law this lab and future derivatives of
    [Show full text]
  • Outputting Event Log Events to a Remote SQL Database Using Powershell
    Peter McEldowney Mark Waddington | Capstone CSNT 255 Outputting Event Log Events to a Remote SQL Database Using PowerShell Objective: After completing this lab, the Administrator will have the Event Log from the computer of their choice uploading information to a SQL database. The step-by-step outlines how to create the tables that will be used to organize the data and will cover how to create a basic SQL script to create these tables. Within the script to create the tables, indexes will be covered to ensure quick access to the data by a particular column that is indexed and will also cover items to be aware of. After creating these tables, a script to upload the event log items to the SQL server will be created so that the script can be run from any machine to ensure scalability. After the script is created and tested, this step-by-step will go through how to create a trigger that will run the script whenever a new event log entry is created. Requirements: PowerShell 3.0, Microsoft SQL Server [w/ Management Tools] Step 1 : Create a diagram of the tables that will be used to store the data Considerations when designing your tables: a) What data is available? b) How will you identify the machine once the data is in the database? c) What log did the data come from and how will this be stored in the database? d) Is there an efficient way to organize the data to make retrieving the data quicker? e) What columns will people be searching from? f) What should the Primary Keys for the table(s) be? What is a Primary Key? A primary key is basically an index number.
    [Show full text]
  • IBM Qradar: Wincollect User Guide V7.3.1 Chapter 1
    IBM QRadar WinCollect User Guide V7.3.1 IBM Note Before using this information and the product that it supports, read the information in “Notices” on page 99. Product information © Copyright International Business Machines Corporation 2011, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this WinCollect User Guide...........................................................................v Chapter 1. WinCollect overview............................................................................. 1 What's new in WinCollect............................................................................................................................ 4 MSEVEN6 protocol....................................................................................................................................... 5 Chapter 2. Installation prerequisites for WinCollect............................................... 7 Communication between WinCollect agents and QRadar..........................................................................8 Enabling remote log management on Windows.................................................................................... 9 Hardware and software requirements for the WinCollect host................................................................10 Prerequisites for upgrading WinCollect agents.........................................................................................12 Chapter 3. WinCollect installations.....................................................................
    [Show full text]