Network Security Hacks [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Hacks [Electronic resources] - نسخه متنی

Andrew Lockhart

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Hack 25 Secure Your Event Logs

Keep your system's logs from
being tampered with.

Windows has some very powerful
logging
features. Unfortunately, by default the event logs are not protected
against unauthorized access or modification. You may not realize that
even though you have to view the logs through the Event Viewer, the
event logs are simply regular files just like any other. To secure
them, all we have to do is locate them and apply the proper
ACLs.

Unless their location has been changed through the registry, you
should be able to find the logs in the
%SystemRoot%\system32\config directory.

The three files that correspond to the Application Log, Security Log,
and System Log are AppEvent.Evt,
SecEvent.Evt, and
SysEvent.Evt, respectively. Now, apply ACLs to
limit access to only Administrator accounts. You can do this by
bringing up the Properties dialog for the files and clicking the
Security tab. After you've done this, remove any
users or groups other than Administrators and SYSTEM from the top
pane.


/ 158