Establishing a Windows Server 2003 Audit Policy for the ForestAn audit policy is more than the configuration of a Group Policy Audit Policy and associated logs. Because Group Policy automates the implementation of security event collection, designing and implementing such a policy is a good first step in building a more comprehensive audit policy for your enterprise. Audit Policy is a part of the Security Settings section of Group Policy and, therefore, can be quickly configured and implemented across an entire domain. Learning the basics of configuration and interpretation of the events collected can help you determine what else is needed while you are benefiting from what you have quickly and easily implemented.WARNING: Don't Configure Audit Policy BlindlyUse caution when implementing Audit Policy. You can easily collect more data than can easily be reviewed, and if you have not properly configured the Security Event Log and your policies for managing events, this data collection can overwhelm or even halt a system's operation. Audit Policy, like many Windows Server 2003 security features, can be quickly implemented, providing you with excellent benefits or with complete disaster. Spend some time learning about what you are doing and planning how the system will operate and how the data will be used.Audit Policy is configured by default for Windows Server 2003 domain controllers. (Auditing is not turned on by default in previous releases of Windows.) An audit policy capable of producing comprehensive security log data has been available since the beginning of Windows NT. Although it may be argued that the collection of an audit trail is by itself not a sound security practice (you have to use the data in order for it to be effective), the default collection of this data is valuable in the following ways:After an intrusion or other security incident, the existence of audit records may be useful to determine what happened.Audit records may provide prosecutorial evidence of fraud, theft, or other illegal activities.Audit records may provide internally acceptable proof of non-compliance to organization policy.Because IT personnel are trained in the use of computer logs for monitoring and troubleshooting performance and other production issues, the availability of security-related information can assist them in these efforts (for example, in troubleshooting logon issues).Curiosity on the part of IT personnel who may examine log information can inadvertently bring to light security issues or evidence of intrusion, and better security practices can be developed as risks to operation are exposed. Audit Policy BasicsIn a Windows Server 2003 domain, Audit Policy settings are configured in the Computer Configuration, Windows Settings, Security Settings, Local Policies, Audit Policy section of a GPO. When this policy is configured, it applies to the computers whose accounts are within the container to which the GPO is linked. Security events are logged to the Security Event Log of the computer within which the event occurred. The Audit Policy in the Default Domain Controller GPO, as shown in Figure 18-1, is configured by default. However, there are no settings for the Default Domain GPO. Therefore, while some audit information is logged to the security event log on each DC, events are not logged for other computers joined to the domain. Figure 18-1. The default Audit Policy for the domain controller's OU.[View full size image] ![]() Determining Which Computers to Audit and Which Events to CollectIt is easy to suggest that you should turn on auditing for all computers, but in most environments, this is impractical. Certainly, all domain controllers, all servers, and those workstations in sensitive areas or where sensitive data is stored or from which it is accessed should have auditing tuned on. Examples of sensitive servers are mail servers, firewalls, web servers, database servers, and other servers that are part of critical or sensitive operations. For example, if an n-tier application (an applications whose components are spread across multiple computers) such as an e-commerce, customer relationship management, or distribution application is in operation, all computers involved in the application should be audited. Before blindly enabling auditing on these computers for full event collection, you should, of course, consider the impact on performance and on default user rights and permissions set by these applications. For example, auditing account logon events on Exchange servers may produce so many events that it has a very bad impact on performance.Determine and Configure Audit PolicyThe default Domain Controllers policy does have auditing configured, but is it right for your organization? What other policies need to be configured? The default Domain Controllers policy should be adjusted to meet your auditing needs for DCs. In addition, when you have decided which events should be collected at various servers and workstations, configure those policies within a GPO linked to the OU within which the computer account resides. Although it's possible to configure the Audit Policy for all computers in the domain by configuring the Audit Policy in a GPO linked to the domain object, this may not be practical either because security log entries will be so numerous as to never be reviewed, or because Audit Policy settings need to be configured differently for computers that play different roles on the network. If standalone computers are part of your organization, you must configure a local audit policy within the Local Security Policy console or by using the Group Policy snap-in.On a standalone Windows Server 2003 computer, Audit Policy settings can be set toSuccessFailureSuccess and failureNo auditingIn a GPO, Audit Policy settings can be one of the following:Not configuredNo auditingSuccessFailureSuccess and failure Normal GPO hierarchical rules apply. A setting of Not configured means no selection. An Audit Policy set higher in the OU hierarchy or at the site or domain level will be unaffected by a GPO that specifies Not configured. No auditing, on the other hand, explicitly turns off auditing, and if the GPO within which it is located is closer to the computer account, it will override earlier settings. To change settings, double-click the policy to open its Property page and select or deselect the desired option. Audit policies are listed and described in Table 18-1.
Interpreting Audit Policy EventsAfter Audit Policy is configured, a lot of information will be collected. To be of value, it must be used. If security logs are reviewed in real time, they can provide evidence of an ongoing attack or can reveal a weakness that requires immediate correction. Archival records of activity on the server can provide evidence and establish accountability after the fact. Some activity may only be noticed when reviewing activity in the logs over time. By looking at the events over a period of hours or days, a pattern may emerge, or you may find a more sinister reason for some seemingly innocent behavior. The first step in learning how to use log data is to be able to understand the events that are being recorded there. Table 18-3 provides a list of security events that may be found in the security event log and how they might be interpreted.Configure Auditing for File, Folder, Registry, and Printer ObjectsTo configure auditing for files, folders, registry, and printer objects, you must configure the Audit object access policy and configure auditing directory on the object. Setting auditing on the object adds an access control entry (ACE) to the object's system access control list (SACL). To configure auditing on files or folders, follow these steps:
To configure auditing of registry keys, follow these steps:
To configure auditing for printers, follow these steps:
If ACEs are set, events are logged to the event log. Like ACEs for DACLs, ACEs for SACLs are composed of a user group or user name and a permission. SACL ACEs are set for success and/or failure, not Allow or Deny. When SACL ACEs are set, any access that meets their conditions will result in a record in the Security Event Log. Which of these objects should you audit? Auditing access to all objects would be of little value. Who cares, for example, if a user is reading documents that they created? A good way to determine what access should be audited is to use the classic approach to data protection: Classify data by its sensitivity and act accordingly. If data is already classified in your organization, you may be able to use this information; if not, using this method requires that you learn from the data owners which data they consider sensitive and to what degree. You can make some educated guess to help you in your discussions with them. For example, you may want to audit access to printers used to print checks, or other printers that have restricted access. Don't forget to apply the same thought process to data that IT owns, such as system files. It's useful, for example, to audit access to the %WINDIR%\system32\config folder on the domain controller. This folder holds the event log files and registry files. Access to the SAM file stored here might mean the DC has been started in restore mode since the SAM is offline on a DC. Access to other files might also bear investigation. By default, only the Administrators group and the system have access to these files, so auditing for permission changes would be wise. Configure Auditing of AD ObjectsConfiguring auditing of AD objects is similar to configuring auditing for files and folders permissions. Like other object access, a policy in audit policy as well as specific object settings must be in effect. Some AD objects already have SACL ACEs set. When you configure the Audit Directory Service Access audit policy and these objects are access, audit records will be recorded in the Security Event Log. Just as a limited number of permissions on objects other than directory objects makes setting access controls on these objects easier, the large number of permissions on directory objects makes them difficult to audit. To get started, examine the settings that are preconfigured, and do not make changes or add auditing to additional objects until you have done so.Until you understand the current settings, you cannot decide if they should be reduced or increased. You must determine the information that they will produce in the security event log and understand why that information would be valuable. To do so, consider the following:Which objects are preconfigured for audit? What information is sought?Which groups are audited?What permissions are audited?To get started, look at important objects. Start with the obvious. For example, examine the auditing settings for the domain object. You can do so by examining the Auditing Properties page, as displayed in Figure 18-5, of the object. To examine the settings, right-click the domain object in Active Directory Users and Computers and select Properties, then select the Security tab, and use the Advanced button to get to the Auditing page. Figure 18-5. Audit settings on the domain object are preset to record access.[View full size image] ![]()
Figure 18-6. Review the specifics of auditing settings for each group.![]()
Figure 18-7. Extended Rights are defined per object and listed on the Object page.![]() Figure 18-8. AD object access events indicate the access and user as well as DC.![]() Configure Event Log PolicyThere are three Windows Server 2003 default logs: System, Application, and Security. Other logs are created depending on the computer role. For example, Windows Server 2003 DNS servers have a DNS event log, while domain controllers have a Directory Service event log and a File Replication Service event log. All logs can be viewed from the Event Viewer, as shown in Figure 18-9. The properties of the event logs can be displayed by right-clicking the log and selecting Properties, as shown in Figure 18-10. Event log properties may be set in Group Policy for the three default logs, as shown in Figure 18-11. Therefore, consistency across servers for these logs is possible. Properties for all other logs must be set directly on the log. Setting properties for these logs requires manual work or a custom script.Figure 18-9. Events are viewed in the Event Viewer.[View full size image] ![]() Figure 18-10. Event log properties can be configured directly on the event log.![]() Figure 18-11. Event log properties for the three default logs can be set in Group Policy.[View full size image] ![]() Configure User RightsTwo user rights are directly related to the auditing function:Generate security auditsAccounts with this right can be used to add events to the security log. By default, the Local Service and Network Service accounts are included in the Default Domain Controllers Policy. This user right might be added to a service account to enable its application to add events to the security log. Best practices state that the application should be written, where possible, to use the Local Service or Network Service account for this purpose.Manage auditing and security log By default, only the Administrators group has the right to modify the audit policy and manage the security event log. Create a custom Windows group for auditors and provide that group this right. This allows auditors to review the security log without having full administrator rights. Consider the implications of giving them the right to manage the log. This allows auditors, who are often defined as "observers," the ability to change the systems they are auditing. Chapter 3 of "Introduction to the Working with Active Directory Permissions in Exchange Server 2003 Guide" at http://www.microsoft.com/technet/prodtechnol/Exchange/guides/E2k3ADPerm/52821d76-9941-4eb2-8384-ca4fe790e38e.mspx. Configure Security OptionsIn addition to a formal audit policy, several Security Options can be set that affect auditing. The security options are as follows:Audit: Audit the access of global system objectsGlobal system objects are objects such as mutexes (used for thread synchronization), events, semaphores (locking objects), and DOS devices. If this policy is enabled, these objects are created with a default SACL, and access to them is audited. By default, this option is not enabled.Audit: Audit the use of Backup and Restore privilege Setting this option generates a large number of events during any backup and restore. The backup of each file is recorded. Modern backup programs create logs that can provide this information in a more manageable format.Audit: Shut down system immediately if unable to log security If the Retention method in the security event log is Do not overwrite events (Clear log manually) and this Security Option is set, processing on the computer will be stopped if the security log is full. An administrator will have to archive and clear the log, then reset this option before users are able to log on. A stop error C0000244{Audit failed} is generated. Do not set this Security Option unless ensuring a complete log (no events lost) is more important than production and unless an administrator is available at all times to recover from a full log. |