Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

20411B-ENU-TrainerHandbook

.pdf
Скачиваний:
237
Добавлен:
01.05.2015
Размер:
16.48 Mб
Скачать
security-sensitive group.
management events can reveal a malicious user who is attempting to manipulate the membership of a
auditing based on your organization’s IT security policies and requirements. For example, if you audit
However, not all failure events are audited by default. You might need to implement additional failure
the domain, and the retrieval of a user’s logon scripts are all logged.

 

 

 

 

Administering Windows Server® 2012 11-7

 

 

 

 

 

 

 

 

 

 

 

Audit policy

 

Description

Default setting

MCT

 

 

setting

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Audit Logon

Creates an event when a user logs on interactively

Successful logons are

USE

 

 

Events

(locally) to a computer or over the network

audited.

 

 

 

 

(remotely). For example, if a workstation and a

 

 

 

 

 

server are configured to audit logon events, the

 

 

 

 

 

workstation audits a user logging on directly to that

 

 

 

 

 

workstation. When the user connects to a shared

 

 

 

 

 

folder on the server, the server logs that remote

 

 

 

 

 

 

 

 

 

 

 

 

 

logon. When a user logs on, the domain controller

 

 

 

 

 

 

 

 

records a logon event because logon scripts and

 

 

 

 

 

 

 

 

policies are retrieved from the domain controller.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Audit Account

Audits events, including the creation, deletion, or

Successful account

ONLY

 

 

Management

modification of user, group, or computer accounts,

management activities

 

 

 

 

and the resetting of user passwords.

are audited.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Audit Directory

Audits events that are specified in the system access

Successful directory

.

 

 

 

 

 

 

 

Service Access

control list (SACL), which is seen in an Active

service access events are

 

 

 

 

Directory object’s Properties Advanced Security

audited, but few

 

 

 

 

 

 

 

Settings dialog box. In addition to defining the audit

objects’ SACLs specify

 

 

 

 

 

 

 

policy with this setting, you must also configure

audit settings.

 

 

 

 

 

 

 

auditing for the specific object or objects by using

 

 

 

 

 

 

 

 

the SACL of the object or objects. This policy is

 

 

 

 

 

 

 

 

similar to the Audit Object Access policy that you

 

 

 

 

 

 

 

 

use to audit files and folders, but this policy applies

 

 

 

 

 

 

 

 

to Active Directory objects.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Audit Policy

Audits changes to user rights assignment policies,

Successful policy

 

 

 

 

 

Change

audit policies, or trust policies.

changes are audited.

 

 

 

 

 

 

 

 

 

 

 

 

 

Audit Privilege Use

Audits the use of a privilege or user right. See the

No auditing is

STUDENT

 

 

 

 

explanatory text for this policy in the Group Policy

performed by default.

 

 

 

 

Management Editor.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Audit System

Audits system restart, shutdown, or changes that

Successful system

 

 

 

 

 

Events

affect the system or security logs.

events are audited.

 

 

 

 

 

 

 

 

 

 

 

 

 

Audit Process

Audits events such as program activation and

No events are audited.

USE

 

 

Tracking

process exit. See the explanatory text for this policy

 

 

 

 

 

 

 

 

 

 

 

in the Group Policy Management Editor.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Audit Object

Audits access to objects such as files, folders,

No events are audited.

 

 

 

 

 

Access

registry keys, and printers that have their own

 

 

 

 

 

 

 

 

SACLs. In addition to enabling this audit policy, you

 

 

 

 

 

 

 

 

must configure the auditing entries in objects’

 

 

 

 

 

 

 

 

SACLs.

 

 

 

 

Notice that most major Active Directory events are already audited by domain controllers, assuming thatPROHIBITED the events are successful. Therefore, the creation of a user, the resetting of a user’s password, the logon to

failed account logon events, you can expose malicious attempts to access the domain by repeatedly trying to log on as a domain user account without yet knowing the account’s password. Auditing failed account

11-8 Configuring Encryption and Advanced Auditing

MCT

 

 

 

 

 

 

 

 

One of the most important tasks you must perform is to balance and align the audit policy with your

 

 

 

corporate policies, and with what is realistic. Your corporate policy might state that all failed logons

 

 

 

and successful changes to Active Directory users and groups must be audited. That is easy to achieve in

USE

Active Directory Domain Services (AD DS). But how, exactly, are you going to use that information?

 

 

Verbose auditing logs are useless if you do not know how, or do not have the tools, to manage those logs

effectively. To implement auditing, you must have a well-configured audit policy, and have the tools with

 

 

 

which to manage audited events.

.ONLY

Specifying Auditing Settings on a File or Folder

 

 

 

Many organizations elect to audit file system

 

 

 

 

 

 

 

 

access to provide insight into resource usage and

 

 

 

 

potential security issues. Windows Server 2012

 

 

 

 

supports granular auditing based on user or

 

 

 

 

group accounts and the specific actions

 

 

 

 

performed by those accounts. To configure

 

 

STUDENT

auditing, you must complete three steps:

 

 

 

 

 

 

specify auditing settings, enable audit policy,

 

 

 

 

and evaluate events in the security log.

 

 

 

 

You can audit access to a file or folder by adding

 

 

 

 

auditing entries to its SACL. To do this, perform

 

 

 

 

the following steps:

 

 

 

 

 

 

 

 

1. Open the properties dialog box of the file or folder, and then click the Security tab.

 

 

 

2. On the Security tab, click Advanced.

 

 

 

3. Click Auditing.

 

 

 

4. To add an entry, click Edit. This opens the Auditing tab in Edit mode.

 

 

 

5. Click Add to select the user, group, or computer to audit.

USE

6. In the Auditing Entry dialog box, indicate the type of access to audit.

Considerations for Configuring Auditing for Files and Folders

You can audit for successes, failures, or both as the specified user, group, or computer attempts to access

the resource by using one or more of the granular access levels.

You can audit successes for the following purposes:

To log resource access for reporting and billing.

To monitor access that would suggest users are performing actions greater than what you had planned, indicating that permissions are too generous.

To identify access that is out of character for a particular account, which might be a sign that a user account has been breached by a hacker.

You can audit failed events for the following purposes:

To monitor for malicious attempts to access a resource to which access has been denied.

To identify failed attempts to access a file or folder to which a user does require access. This would indicate that the permissions are not sufficient to meet a business requirement.

PROHIBITED

Locating Audit Policy Settings

Administering Windows Server® 2012

MCT

11-9

 

Auditing entries directs Windows operating systems to audit the successful or failed activities of a security principal (user, group, or computer) to use a specific permission. Full Control includes all individual access levels, so this entry covers any type of access. For example, if you assign Full Control to the Consultant group, and if a Consultant group member attempts access of any kind and fails, this activity will be logged.

Typically, auditing entries reflect the permission entries for the object, but auditing entries and

USE

permissions entries may not always match. In the above scenario, keep in mind, that a member of the

Consultants group can also belong to another group that does have permission to access the folder.

 

Because that access will be successful, the activity is not logged. Therefore, if you are concerned about restricting folder access and ensuring that users do not access it in any way, you should monitor failed access attempts. However, you should also audit successful access to identify situations in which a user is accessing the folder through another group membership that is potentially incorrect.

 

Note: Audit logs can get large quite rapidly. Therefore, configure the bare minimum

ONLY.

 

required to achieve your company’s security objective. When you specify to audit the successes

and failures on an active data folder for the Everyone group by using Full Control (all

 

 

permissions), this generates enormous audit logs that could affect the performance of the server,

 

 

and can make locating a specific audit event almost impossible.

 

 

Enabling Audit Policy

 

 

Configuring auditing entries in the security

 

 

 

 

STUDENT

descriptor of a file or folder does not, in itself,

 

enable auditing. Auditing must be enabled by

 

defining the appropriate Audit object access

 

policy setting within Group Policy.

 

After auditing is enabled, the security subsystem

 

begins to log access as directed by the audit

 

 

 

settings.

 

 

 

The policy setting must be applied to the server

 

 

 

that contains the object that is being audited.

 

 

 

You can configure the policy setting in the server’s

 

 

 

 

USE

local Group Policy Object (GPO), or you can use a

 

 

GPO that is scoped to the server.

 

 

You can define the policy then to audit Success events, Failure events, or both. The policy setting must specify auditing of Success or Failure attempts that match the type of auditing entry in the object’s SACL. For example, to log a failed attempt by Consultants to access the Confidential Data folder, you must configure the Audit object access policy to audit failures, and you must configure the SACL of the Confidential Data folder to audit failures. If the audit policy audits successes only, the failure entries in the folder’s SACL will not trigger logging.

In Group Policy Management in AD DS, there is a group of standard settings in a GPO that control audit behavior. This set of audit policy settings is found under Computer Configuration, in the following node:

Windows Settings\Security\Local Policies\Audit Policy. The audit policy settings govern the following basic settings:

PROHIBITED

Audit account logon events

Audit account management

11-10 Configuring Encryption and Advanced Auditing

Audit directory service access

Audit logon events

Audit object access

Audit policy change

Audit privilege use

Audit process tracking

Audit system events

Note: Remember that audited and logged access is the combination of the settings in audit policy and the audit entries on specific files and folders. If you have configured audit entries to log failures, but the policy enables only logging for successes, your audit logs will remain empty.

Evaluating Events in the Security Log

After you have enabled the Audit Object Access Policy setting and specified the access you want to audit by using object SACLs, the system begins to log access according to the audit entries. You can view the resulting events in the server’s security log. To do this, in Administrative Tools, open the Event Viewer console, and then expand Windows Logs\Security.

In the security log, audit events are represented as either Audit Success or Audit Failure Event Types. The Details field of each event will contain the relevant information, depending on what type of

event was audited. Many audit categories will return a large number of events. These events can be tedious to navigate, so event filtering is recommended. You can filter based on the details field, and include appropriate information, such as the name of a user or the name of a file or folder that is being audited.

Advanced Audit Policies

In Windows Server 2012 and Windows Server 2008 R2, administrators can audit more specific aspects of client behavior on the computer or network. This makes it easier for the administrator to identify the behaviors that are of greatest interest. For example, in Computer Configuration \Policies\Windows Settings\Security Settings \Local Policies\Audit Policy, there is only one policy setting—Audit logon events—for logon events. In Computer Configuration\Policies \Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies, you can

instead choose from ten different policy settings in the Logon/Logoff category. This provides you with a more detailed control of what aspects of logon and logoff you can track.

PROHIBITED USE STUDENT .ONLY USE MCT

Administering Windows Server® 2012

MCT

11-11

 

These security auditing enhancements can help your organization’s audit compliance with important

 

 

business-related and security-related rules by tracking precisely defined activities, such as:

 

 

A group administrator who has modified settings or data on servers that contain finance information.

An employee within a defined group who has accessed an important file. USE

That the correct SACL is applied to every file and folder or registry key on a computer or file share, as a verifiable safeguard against undetected access.

Understanding Advanced Audit Policy Settings

Account Logon. These settings enable auditing the validation of credentials, and other Kerberos- ONLY specific authentication and ticket operation events.

Account Management. You can enable auditing for events relating to the modification of user

accounts, computer accounts, and groups with the Account Management group of settings. .

Detailed Tracking. These settings control auditing of encryption events, Windows process creation and

termination events, and remote procedure call (RPC) events. STUDENT DS Access. These audit settings involve access to Directory Services, including general access, changes,

and replication.

Logon/Logoff. Standard logon and logoff events are audited by this group of settings. Other account specific activity, such as Internet Protocol security (IPsec), Network Policy Server, and other uncategorized logon and logoff events are also audited.

Object Access. These settings enable auditing for any access to AD DS, registry, application, and file storage.

Policy Change. When you configure these settings, internal changes to audit policy settings are audited.

Privilege Use. Within the Windows environment, Windows Server 2012 audits attempts of privilege

use, when you configure these settings. USE

System. System settings are used for auditing changes to the state of the security subsystem.

Global Object Access Auditing. These settings are for controlling the SACL settings for all objects on one or more computers. When settings in this group are configured and applied with Group Policy,

SACL membership is determined by the configuration of the policy setting, and the SACLs are

configured directly on the server itself. You can configure SACLs for file system and registry access PROHIBITED under Global Object Access Auditing.

11-12 Configuring Encryption and Advanced Auditing

Demonstration: Configuring Advanced Auditing

This demonstration shows how to create and edit a GPO for audit policy configuration.

Demonstration Steps

Create and edit a GPO for audit policy configuration

1.On LON-DC1, open Group Policy Management.

2.Create a new GPO called File Audit.

3.Edit the File Audit GPO, and enable Success and Failure audit events for the Audit Detailed File Share and Audit Removable Storage settings.

4.Close Group Policy Management.

PROHIBITED USE STUDENT .ONLY USE MCT

Administering Windows Server® 2012 11-13

Lab: Configuring Encryption and Advanced Auditing

MCT

 

Scenario

 

 

 

 

 

 

A. Datum is a global engineering and manufacturing company with head office based in London, United

 

Kingdom. An IT office and data center are located in London to support the London location and other

USE

 

locations. A. Datum has recently deployed a Windows Server 2012 server and client infrastructure.

 

 

 

 

You have been asked to configure the Windows Server 2012 environment to protect sensitive files, and to

 

ensure that access to files on the network is audited appropriately. You have also been asked to configure

 

auditing for the new server.

 

.ONLY

 

Objectives

 

 

After completing this lab, you will be able to:

 

 

• Encrypt and recover files by using EFS management tools.

 

• Configure advanced auditing.

 

 

Lab Setup

 

 

 

 

 

 

Estimated Time: 40 minutes

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Virtual Machines

20411B-LON-DC1

 

 

 

 

20411B-LON-CL1

 

 

 

 

20411B-LON-SVR1

 

 

 

 

 

 

 

 

User Name

Adatum\Administrator

 

 

 

 

 

 

 

 

Password

Pa$$w0rd

STUDENT

 

 

 

 

For this lab, you will use the available virtual machine environment. Before you begin the lab, you must

 

 

complete the following steps:

1.On the host computer, click Start, point to Administrative Tools, and then click Hyper-V ManagerUSE.

2.In Hyper-V® Manager, click 20411B-LON-DC1, and in the Actions pane, click Start.

3.In the Actions pane, click Connect. Wait until the virtual machine starts.

4.Log on using the following credentials:

o User name: Adatum\Administrator PROHIBITED o Password: Pa$$w0rd

5.Perform steps 2 through 4 for 20411B-LON-CL1 and 20411B-LON-SVR1.

11-14 Configuring Encryption and Advanced Auditing

Exercise 1: Encrypting and Recovering Files

Scenario

Your organization wants to allow users to start encrypting files with EFS. However, there are concerns about recoverability. To enhance the management of the certificates used for EFS, you are going to configure an internal CA to issue certificates to users. You will also configure a recovery agent for EFS, and verify that the recovery agent can recover files.

The main tasks for this exercise are as follows:

1.Update the recovery agent certificate for the Encrypting File System (EFS).

2.Update Group Policy on the computers.

3.Obtain a certificate for EFS.

4.Encrypt a file.

5.Use the recovery agent to open the file.

Task 1: Update the recovery agent certificate for the Encrypting File System (EFS)

1.On LON-DC1, from Server Manager, open the Group Policy Management administrative tool.

2.Edit the Default Domain Policy that is linked to Adatum.com.

3.In the Group Policy Management Editor, browse to Computer Configuration\Policies \Windows Settings\Security Settings\Public Key Policies\Encrypting File System.

4.In the Encrypting File System folder, delete the existing Administrator certificate.

5.Create a new Data Recovery Agent.

6.Read the information about the new certificate, and verify that it was issued by AdatumCA.

Task 2: Update Group Policy on the computers

1.

On LON-DC1, use the Windows PowerShell® command-line interface to run gpupdate /force.

2.

On LON-CL1, open a command prompt and run gpupdate /force.

3.

Log off of LON-CL1.

Task 3: Obtain a certificate for EFS

1.On LON-CL1, log on as Adatum\Doug with a password of Pa$$w0rd.

2.Run mmc.exe to open an empty MMC console.

3.Add the Certificates snap-in to the MMC console.

4.In the MMC console, right-click Personal, and request a new certificate.

5.Select a Basic EFS certificate.

6.Verify that the new certificate was issued by AdatumCA.

7.Close the console, and do not save the changes.

PROHIBITED USE STUDENT .ONLY USE MCT

The main tasks for this exercise are as follows:
Results: After completing this exercise, you will have encrypted and recovered files.
Exercise 2: Configuring Advanced Auditing
Scenario

 

Administering Windows Server® 2012

MCT

 

11-15

 

Task 4: Encrypt a file

 

 

1.

On LON-CL1, browse to \\LON-DC1\Mod11Share\Marketing.

USE

2.

Open the properties of DougFile.

 

 

3.

Enable encryption in the advanced attributes for only the DougFile.

 

 

4.

Close Windows Explorer.

 

 

5.

Log off of LON-CL1.

 

 

Task 5: Use the recovery agent to open the file

1.On LON-DC1, browse to E:\Labfiles\Mod11\Mod11Share\Marketing.

2.Open DougFile.txt, modify the contents, and then save the file.

Your manager has asked you to track all access to file shares that are stored on LON-SVR1. You also need to be aware of any time a user accesses a file on a removable storage device that is attached to the server. You have decided to implement the appropriate object access settings by using Advanced audit policy Configuration.

STUDENT .ONLY

1.Create a Group Policy Object (GPO) for advanced auditing.

2.Verify audit entries.

Task 1: Create a Group Policy Object (GPO) for advanced auditing

1.On LON-DC1, from Server Manager open Active Directory Users and Computers. USE

2.Create a new OU in Adatum.com named File Servers.

3.Move LON-SVR1 from the Computers container to the File Servers OU.

4.On LON-DC1, open Group Policy Management.

5.Create a new GPO called File Audit, and link it to the File Servers OU. PROHIBITED

6.Edit the File Audit GPO and under Computer Configuration, browse to the Advanced Audit Policy Configuration\Audit Policies\Object Access node.

7.Configure both the Audit Detailed File Share and Audit Removable Storage settings to record Success and Failure events.

8.Restart LON-SVR1 and log on as Adatum\Administrator with a password of Pa$$w0rd.

11-16 Configuring Encryption and Advanced Auditing

5.Open Event Viewer, and view the Audit Success events in the Security Log.

6.Double-click one of the log entries with a Source of Microsoft Windows security auditing, and a

Task Category of Detailed File Share.

7.Click the Details tab, and note the access that was performed.

Results: After completing this exercise, you will have configured advanced auditing.

To prepare for the next module

When you finish the lab, revert the virtual machines to their initial state. To do this, complete the following steps:

1.On the host computer, start Hyper-V Manager.

2.In the Virtual Machines list, right-click 20411B-LON-DC1, and then click Revert.

3.In the Revert Virtual Machine dialog box, click Revert.

4.Repeat these steps for 20411B-LON-SVR1 and 20411B-LON-CL1.

PROHIBITED USE STUDENT .ONLY USE MCT

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]