9
Maintaining Host Security Logs

Maintaining Host Security Logs. Security logs are invaluable for verifying whether the host's defenses are operating properly. Another reason to maintain

Embed Size (px)

Citation preview

Page 1: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

Maintaining Host Security Logs

Page 2: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

Maintaining Host Security Logs

Security logs are invaluable for verifying whether the host's

defenses are operating properly.

Another reason to maintain logs is to ensure that forensics evidence

is available when you need to figure out what happened, even if you

already determined that something went wrong.

Of course, each security safeguard is only as good as the actions

taken upon it. A log file is of minimal value if you never look at it.

Page 3: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

Windows Logging and Auditing

Windows offers built-in tools that help administrators capture

security-related events and audit the resulting log files.

By default, Windows logs only general system events aimed at

resolving system and application faults.

To capture security-related information, you must enable auditing

through the Local Security Policy editor (on a standalone system) or

Group Policy (when using Active Directory).

You can use the Event Viewer program to examine security log

entries collected by the Windows auditing facility.

Page 4: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

Windows Logging and Auditing

Page 5: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

Windows Logging and Auditing

Previous Figure illustrates reasonable settings for a Windows

workstation, although the specifics of the configuration will depend on

your organization's requirements.

As you can see, Windows allows you to log successful and failed

actions associated with several categories of events. T

he more event types you choose to log, the more thorough your

understanding will be of what takes place on the system.

On the other hand, excessive auditing can degrade the host's

performance, fill up its file system, and overwhelm you with

superfluous log entries.

Page 6: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

Windows Logging and Auditing

Striking the right balance for event logging may require several

different settings until you achieve the desired configuration.

Page 7: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

UNIX Logging and Auditing

Like Windows, UNIX can gather detailed information regarding

security events on the system, such as logon and logoff times,

occurrences of failed logons, the use of privileged accounts, and

even the commands users execute.

The configuration of UNIX logging facilities is flexible and varies

across UNIX flavors. However, here are some of the more standard

log files as given ahead:

Page 8: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

UNIX Logging and Auditing

1. utmp Maintains a snapshot listing of users who are currently

logged in. Viewable using the who and users commands.

2. wtmp Maintains a historical record of users' login and logout

activity. Viewable using the who and last commands.

3. btmp Maintains a historical record for failed user logins. Viewable

using the lastb command.

A UNIX system stores event records in these log files using a

binary format. As a result, you need to use the appropriate tools,

specified in the preceding list, to view their contents.

Page 9: Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain

UNIX Logging and Auditing In addition to maintaining the binary log files just mentioned, UNIX

systems rely on the Syslog facility to centralize logging of security and

other system events.

Syslog typically uses the /etc/syslog.conf configuration file to determine

what types of events to log and where to store the log files.

Depending on how you configure it, Syslog can record messages from the

kernel, user processes, the mail system, locally defined events, and so on.

Syslog stores its records in text-based log files, which can be examined by

regular text file viewers as well as through the use of the automated

monitoring tools.