The Institute of Internal Auditors Detroit Chapter Presents
Total Page:16
File Type:pdf, Size:1020Kb
1 The Institute of Internal Auditors Detroit Chapter Presents http://www.securelyyoursllc.com/ 1 Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. MOST Suitable for all categories business and personal presentation 3 If You Have Questions… If you have questions during the webcast: – If necessary, exit Full Screen View by pressing the Esc key – Submit questions through the “Ask a Question” button – Questions will be answered after the presentation portion is concluded http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 4 Earning CPE Credit In order to receive CPE credit for this webcast, participants must: . Attend the webcast on individual computers (one person per computer) . Answer polling questions asked throughout the webcast . When answering polling questions, select your answer and the click “Vote” button (next to the “Ask a Question” button) to submit / save your answer. CPE certificates will be sent to the e-mail address on your BrightTALK account within two weeks of this webinar. http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 5 Please tell us your member status A) Member Detroit Chapter B) Member – Central Region District 2 (Fort Wayne, Toledo, Michiana, W. Mich., Lansing) C) Member – Other District D) Non-member http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 6 Windows Event Logs A brief description Event logs records significant events on your computer, such as when a user logs on to the computer or when a program encounters an error. Whenever these type of events occur, Windows records the event in an event log that you can read by using the Event Viewer application. Windows Event logs have been around since windows NT in (1993). Since Windows vista the Event logs have been updated and now conforms to an XML schema. We will cover Windows 7, Windows Server 2008, Windows Server 2012, Windows Vista . http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 7 TRUE/FALSE Windows event logs record all activity that occurs while it’s in operation by default www.CompanyName.com MOST © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. 8 Starting Event Viewer Windows interface or the command line Windows interface Command line . Click the Start button. Open a command prompt. (To open a command prompt, click Start , click All Programs , click . Click Control Panel . Accessories and then click Command Prompt) . Click System and Maintenance . Type eventvwr . Click Administrative Tools . Double-click Event Viewer . http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 9 http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 10 http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 11 What information appears in event logs? Event Viewer . Application events. Events are classified as error, warning, or information, depending on the severity of the event. An error is a significant problem, such as loss of data. A warning is an event that isn't necessarily significant, but might indicate a possible future problem. An information event describes the successful operation of a program, driver, or service. Security-related events. These events are called audits and are described as successful or failed depending on the event, such as whether a user trying to log on to Windows was successful . Setup events. Computers that are configured as domain controllers will have additional logs displayed here. System events. System events are logged by Windows and Windows system services, and are classified as error, warning, or information. Forwarded events. These events are forwarded to this log by other computers. Note: Some servers may have File Replication and DNS . http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 12 Windows Logs does not contain the category: Polling Question A. Application events B. Security-related events C. Internet Events D. Forwarded events http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 13 Event Properties Common Information in windows events . Source - The software that logged the event, which can be either a program name or a component of the system or of a large program . Event ID - A number identifying the particular event type. The first line of the description usually contains the name of the event type. For example, 6005 is the ID of the event that occurs when the Event Log service is started. User - The name of the user on whose behalf the event occurred. Operational Code - Contains a numeric value that identifies the activity or a point within an activity that the application was performing when it raised the event. For example, initialization or closing. Log - The name of the log where the event was recorded. Task Category - Used to represent a subcomponent or activity of the event publisher. Keywords - A set of categories or tags that can be used to filter or search for events. http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 14 Event Properties (cont.) Common Information in windows events . Computer - The name of the computer on which the event occurred. Date and Time - The date and time that the event was logged. Level - A classification of the event severity. The classification for system and application logs are: Information, Warning, Error, Critical. The classification for the security log are Success Audit or Failure Audit. Other Properties Process ID, Thread ID, Processor ID, Session ID, Kernel Time, User Time, Processor Time, Correlation Id, Relative Correlation Id http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 15 Create an audit Plan Decide what information is of value to your organization . Decide what type of information you want to gain by collecting audit events . Many Events are not audited by default, it is critical that you configure audit policies to fit your needs . Consider the amount of resources that you have available for accumulating and reviewing an audit log. Audit events can take up space on your systems, There is little value in collecting huge amounts of audit data if there is no plan to use it . Consider collecting a combination of Success and failure Audits, both can contain valuable information http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 16 TRUE/FALSE Auditing should be turned on for all events http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 17 Security Events Categories What Security categories can you audit? . Account logon events - Audit this to see each instance of a user logging on to or logging off from another computer in which this computer is used to validate the account. Account management - Audit this to see when someone has changed an account name, enabled or disabled an account, created or deleted an account, changed a password, or changed a user group. Directory service access - Audit this to see when someone accesses an Active Directory® directory service object that has its own system access control list (SACL). Logon events - Audit this to see when someone has logged on or off your computer (either while physically at your computer or by trying to log on over a network). http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 18 Security Events Categories (cont.) What Security categories can you audit? . Object access - Audit this to see when someone has used a file, folder, printer, or other object . Policy change - Audit this to see attempts to change local security policies and to see if someone has changed user rights assignments, auditing policies, or trust policies. Privilege use - Audit this to see when someone performs a user right. Process tracking - Audit this to see when events such as program activation or a process exiting occur. System events - Audit this to see when someone has shut down or restarted the computer, or when a process or program tries to do something that it does not have permission to do. http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 19 Recommended Event Logs to be monitored What Should I monitor? Event ID Event Type Description Identifies local system processes such as (4608 to 4612), (4614 to System Events system startup and shutdown and changes 4616) to the system time 4612 Audit Logs Cleared Identifies all the audit logs clearing events 4624 Successful User Logons Identifies all the user logon events 4625 Logon Failures Identifies all the failed user logon events 4634 Successful User Logoff's Identifies all the user logoff events http://www.securelyyoursllc.com/ Securely Yours LLC © 2014 Securely Yours LLC . All Rights Reserved. 20 Recommended Event Logs to be monitored What Should I monitor? Event ID Event Type Description Identifies when a given object (File, Directory, etc.) is accessed, 4656, (4658 to 4664) Object Access the type of access (e.g. read, write, delete) and whether or not access was successful/failed, and who performed the action 4719 Audit Policy Changes Identifies all the changes done in the audit policy 4720, (4722 to 4726),