<p/> <A NAME="561"><H1>Lesson 2: Planning an Audit Policy</H1></A> <p/>When you plan an audit policy, you need to determine what you want to audit and the computers on which to configure auditing.<p/> <font class=Quote>After this lesson, you will be able to</font> <p/>Plan an audit strategy and determine which events to audit.<p/> <p/><font class=Quote>Estimated lesson time: 5 minutes</font><p/><p/><A NAME="562"><h2>Audit Policy Guidelines</H2></A> <p/>When you plan an audit policy, you must determine the computers on which to set up auditing. Auditing is turned off by default. As you are determining which computers to audit, you must also plan what to audit on each computer. Windows 2000 records audited events on each computer separately.<p/>The types of events that you can audit include the following:<p/> <p/>Accessing files and folders<p/>Logging on and off<p/>Shutting down and restarting a computer running Windows 2000<p/>Changing user accounts and groups<p/>Attempting to make changes to objects in directory services based on Active Directory technology (only if your Windows 2000 computer is part of a domain)<p/> <p/>After you have determined the types of events to audit, you must also determine whether to audit the success of events, the failure of events, or both. Tracking successful events can tell you how often Windows 2000 or users gain access to specific files, printers, or other objects. You can use this information for resource planning.<p/>Tracking failed events can alert you to possible security breaches. For example, if you notice a lot of failed logon attempts by a certain user account, especially if these attempts are occurring outside normal business hours, you can assume that an unauthorized person is attempting to break in to your system.<p/>Other guidelines in determining your audit policy include the following:<p/> <p/>Determine whether you need to track trends of system use. If so, plan to archive event logs. Archiving these logs will allow you to view how use changes over time and will allow you to plan to increase system resources before they become a problem.<p/>Review security logs frequently. You should set a schedule and regularly review security logs because configuring auditing alone doesn't alert you to security breaches.<p/>Define an audit policy that is useful and manageable. Always audit sensitive and confidential data. Audit only those events that will provide you with meaningful information about your network environment. This will minimize use of the computer's resources and make essential information easier to locate. Auditing too many types of events can create excess overhead for Windows 2000.<p/>Audit resource access by using the Everyone group instead of the Users group. This will ensure that you audit anyone who can connect to the network, not just the users for whom you create user accounts in the domain.<p/> <A NAME="563"><h2>Lesson Summary</H2></A> <p/>In this lesson, you learned that in planning an audit policy, you must determine the computers on which to set up auditing and what to audit on each computer. The types of events that you can audit include the following: accessing files and folders, logging on and off, shutting down and restarting a computer running Windows 2000 Professional, and changing user accounts and groups.<p/>You also learned that you can audit the success of events, the failure of events, or both. You track successful events to determine how often Windows 2000 or users gain access to specific files or printers. You can use this information for resource planning. You track failed events to look for possible security breaches. You can also archive the logs to track trends of system use.<p/> - Microsoft Windows 1002000 Professional [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Microsoft Windows 1002000 Professional [Electronic resources] - نسخه متنی

Rick Wallace

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید






Lesson 2: Planning an Audit Policy


When you plan an audit policy, you need to determine what you want to audit and the computers on which to configure auditing.


After this lesson, you will be able to

Plan an audit strategy and determine which events to audit.


Estimated lesson time: 5 minutes

Audit Policy Guidelines


When you plan an audit policy, you must determine the computers on which to set up auditing. Auditing is turned off by default. As you are determining which computers to audit, you must also plan what to audit on each computer. Windows 2000 records audited events on each computer separately.

The types of events that you can audit include the following:


Accessing files and folders

Logging on and off

Shutting down and restarting a computer running Windows 2000

Changing user accounts and groups

Attempting to make changes to objects in directory services based on Active Directory technology (only if your Windows 2000 computer is part of a domain)


After you have determined the types of events to audit, you must also determine whether to audit the success of events, the failure of events, or both. Tracking successful events can tell you how often Windows 2000 or users gain access to specific files, printers, or other objects. You can use this information for resource planning.

Tracking failed events can alert you to possible security breaches. For example, if you notice a lot of failed logon attempts by a certain user account, especially if these attempts are occurring outside normal business hours, you can assume that an unauthorized person is attempting to break in to your system.

Other guidelines in determining your audit policy include the following:


Determine whether you need to track trends of system use. If so, plan to archive event logs. Archiving these logs will allow you to view how use changes over time and will allow you to plan to increase system resources before they become a problem.

Review security logs frequently. You should set a schedule and regularly review security logs because configuring auditing alone doesn't alert you to security breaches.

Define an audit policy that is useful and manageable. Always audit sensitive and confidential data. Audit only those events that will provide you with meaningful information about your network environment. This will minimize use of the computer's resources and make essential information easier to locate. Auditing too many types of events can create excess overhead for Windows 2000.

Audit resource access by using the Everyone group instead of the Users group. This will ensure that you audit anyone who can connect to the network, not just the users for whom you create user accounts in the domain.


Lesson Summary


In this lesson, you learned that in planning an audit policy, you must determine the computers on which to set up auditing and what to audit on each computer. The types of events that you can audit include the following: accessing files and folders, logging on and off, shutting down and restarting a computer running Windows 2000 Professional, and changing user accounts and groups.

You also learned that you can audit the success of events, the failure of events, or both. You track successful events to determine how often Windows 2000 or users gain access to specific files or printers. You can use this information for resource planning. You track failed events to look for possible security breaches. You can also archive the logs to track trends of system use.

/ 156