Auditing Server Applications and ServicesServer applications and services may post events to the Application and System log or to special log files specific to them. Although much of this information may be more helpful for troubleshooting network, OS, or application operation, rather than auditing, some security-specific data may be present, especially if the application or service is configured to do so. A good rule of thumb is to expect that some configuration may need to be done in order to produce audit information and take a good look at documentation and administration tools. Fortunately, Microsoft and others are cognizant of audit requirements and are building opportunities for event collection as well as providing more documentation on them. Information is provided here for more common services. Network Services AuditingNetwork services such as DNS, WINS, and DHCP typically generate a range of events that are logged to the DNS, application, and system logs. DNSSeveral types of logging can be configured, including debug logging, event logging, and object events. Debug logging for DNS is set from the DNS server Debug Logging tab of the Property pages of the DNS server, as shown in Figure 18-13. Click to select Log packets for debugging and then select a packet direction, a transport protocol, and other options. Set up file location and maximum size. Note that debug logging is not turned on by default and may produce enough events to seriously impair performance.Figure 18-13. Set Debug Logging for DNS in the server Property pages.![]() Figure 18-14. Set Event Logging for DNS in the server Property pages.![]() DHCPDHCP audit logging is enabled on the General Property page, as shown in Figure 18-15. Logs are saved at %windir%\System32\dhcp and this can be edited on the Advanced Property page, as shown in Figure 18-16. The DHCP service checks the file system to make sure that there is adequate space for the audit log file after every 50 events it writes to the log file and when the date changes on the server. Log entries include general service information such as start, stop, and authorization, as well as information on the MAC address of the client and the IP address of the client when noting lease assignments and releases. This information provides a history of lease assignments and can aid in tracing which machine had which IP address at a specific time. Figure 18-15. Configure audit logging from the General Property page.![]() Figure 18-16. Configure log location from the Advanced Property page.![]() WINSWINS records error and informational messages to the system log. The level of information recorded is managed by settings on the Advanced Property page of WINS. To change them, select the log detailed events box on the page. When set, in addition to errors, WINS will also log warning and informational messages. IPSec AuditingSuccess or failure of IKE negotiations will be recorded in the Security Event Log if Audit Logon Events is set for Success and Failure. More detailed IKE logging can be configured, and events will be recorded in the %systemroot%\Debug\oakley.log file. A registry entry can be used, or logging can be controlled dynamically by using netsh.To dynamically turn on IKE logging, use this command: To stop logging, use this command: The IKE logging registry key is located at HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\PolicyAgent\Oakley\.To enable logging, add the REG_DWORD value EnableLogging, set it to 1, and then use the command net stop policyagent followed by net start policyagent. Using the registry key is the only way to enable IKE logging for Windows XP and Windows 2000. To stop logging, remove the value or set it to 0, and then stop and start the policy agent service. Certification Authority AuditingAuditing for the certification authority is set on the Auditing Property page of the CA, as shown in Figure 18-17. Object auditing must be turned on in the Audit Policy for the server in order for events to be collected. Check all boxes to prepare an audit trail of changes to settings, backup, certificate issuance and revoking, and key archival. Figure 18-17. Configure CA auditing on the Auditing Property page.![]() VPN AuditingRouting and Remote Access Service (RRAS) logging consists of event logging and authentication and accounting logging. Event logging is configured on the Logging page of the server properties in the Routing and Remote Access console, as shown in Figure 18-18. Event logging is primarily meant to assist troubleshooting connections but can be useful for recording remote access activity for auditing purpose. Authentication and accounting information is recorded locally if Windows authentication and/or Windows accounting is enabled. Events are logged to the %windir%\system32\logfiles folder and can be used to track remote access usage and connection attempts. Figure 18-18. Configure event logging for RRAS.![]() Figure 18-19. Configure authentication and accounting logging.[View full size image] ![]() Figure 18-20. Specify log configuration for authentication and accounting logging.![]() Figure 18-21. Configure log file information and schedule for creating a new log file.![]() Figure 18-22. Use netsh to compile a report of relevant remote access information.[View full size image] ![]() Authorization Manager AuditingAuthorization Manager auditing can be configured to provide information on runtime events and authorization store changes at the authorization store, application, and scope levels. The level of auditing available depends on whether the authorization store is based on Active Directory or XML. Table 18-8 provides the details. The two levels of auditing areApplication runtime Success and failure as defined by policy in the authorization store on items such as client contexts and access checks.Authorization store change An audit record is produced if the authorization store is modified. For all events, success or failure is recorded.
Net Logon Debug LoggingIf Net Logon debug logging is enabled, an intruder can more easily be tracked on the network. Net Logon debug logging is turned on by using the nltest /dbflag:flag at a command prompt. The flag is a hexadecimal number that represents the level of logging required. Flags for Net Logon debug logging are documented in KB article 109626, "Enable Debug Logging for the Net Logon Service" (http://support.microsoft.com/default.aspx?scid=kb;en-us;109626). You can combine the flags with control bits to get the data you want. Because debug logging produces a plethora of events, you may want to limit events produced by requesting timestamps (control bit ox20000000) and just the logon processing events (flag ox00000004). The command to enter then is Once enabled, events are logged to %windir%\debug\netlogon.log.TIP: Examine the Use of Net Logon Debug LoggingAn article on using Net Logon debug logging to track intruders on a Windows network is available online at the United States Department of Energy Information Bridge site (http://www.osti.gov/dublincore/gpo/servlets/purl/821123-32MRSo/native/). The article was written by Christina S. Davis, Principal Network Engineer at Westinghouse Savannah River Company. Sample logs and their interpretations are published in the article. |