Enable Auditing on Servers & Workstations
Enable Auditing on Servers & Workstations
If no Audit policy exists, it will be difficult or impossible to determine what took place during a security incident. However, if audit settings are configured so that many authorized activities generate events, the Security log will fill up with useless data. The following recommendations and setting descriptions are provided to help you determine what to monitor so that the collected data is relevant.
While this is a fairly normal practice for servers, it isn't usually performed on workstations unless there is a high risk of data theft. Our philosophy is that the time to fix the roof is before it starts to rain. By selectively auditing a few key actions, you'll have a place to start investigating theft or destruction of data if someone ever does compromise your workstation. We recommend auditing the following actions:
GPEDIT.MSC >
Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy
|
Setting Legacy Client Windows NT |
Enterprise Client Windows 2000 pro. Windows XP, Vista |
Servers Specialized Security &endash; Limited Functionality |
Event |
Level of Auditing |
Level of Auditing |
Level of Auditing |
Audit account logon events |
Success |
Success, Failure |
Success, Failure |
Audit account management |
Success |
Success, Failure |
Success, Failure |
Audit Directory Service access |
Success |
Success, Failure |
Success, Failure |
Audit logon events |
Success |
Success, Failure |
Success, Failure |
*Audit Object access |
No auditing |
No auditing |
No auditing Subject to server usage |
Audit Policy change |
Success |
Success, Failure |
Success, Failure |
Audit Privilege use |
Success |
Success, Failure |
Success, Failure |
**Audit Process Tracking |
No auditing |
No auditing |
No auditing |
Audit System events |
Success |
Success, Failure |
Success, Failure |
|
|
|
|
*Audit Object access
By itself, this policy setting will not cause any events to be audited. The Audit object access setting determines whether to audit the event when a user accesses an object&emdash;for example, a file, folder, registry key, or printer&emdash;that has a specified system access control list (SACL).
**Audit process tracking
This policy setting determines whether to audit detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access. If you configure this policy setting to log Success values, an audit entry is generated each time that the process that is being tracked succeeds. If you configure this policy setting to log Failure values, an audit entry is generated each time that the process that is being tracked fails.
The Audit process tracking setting will generate a large number of events, so it is typically configured to No auditing, as it is in the baseline policy for all three environments that are defined in this guide. However, this policy setting can be very helpful during an incident response because it provides a detailed log of the processes that are started and the time when each one was launched.