Top Banner
Module 8: Implementing Administrative Templates and Audit Policy
31

Module 8: Implementing Administrative Templates and Audit Policy.

Dec 23, 2015

Download

Documents

Kevin Hardy
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Module 8: Implementing Administrative Templates and Audit Policy.

Module 8: Implementing Administrative Templates

and Audit Policy

Page 2: Module 8: Implementing Administrative Templates and Audit Policy.

Overview

Managing User Rights in Windows Server 2003

Using Security Templates to Secure Computers

Testing Computer Security Policy

Configuring Auditing

Managing Security Logs

Page 3: Module 8: Implementing Administrative Templates and Audit Policy.

Lesson: Managing User Rights in Windows Server 2003

What Are User Rights?

User Rights vs. Permissions

User Rights Assigned to Built-In Groups

Practice: Assigning User Rights

Page 4: Module 8: Implementing Administrative Templates and Audit Policy.

What Are User Rights?

Examples of User RightsExamples of User Rights

Page 5: Module 8: Implementing Administrative Templates and Audit Policy.

User Rights vs. Permissions

User Rights:Actions on System

User Rights:Actions on System

Permissions: Actions on Object

Permissions: Actions on Object

Page 6: Module 8: Implementing Administrative Templates and Audit Policy.

User Rights Assigned to Built-In Groups

Built-in local groups:Built-in local groups:

Administrators

Backup Operators

Power Users

Remote Desktop Users

Users

Administrators

Backup Operators

Power Users

Remote Desktop Users

Users

Groups in Builtin container:Groups in Builtin container:

Account Operators

Administrators

Backup Operators

Pre—Windows 2000 Compatible Access

Print Operators

Server Operators

Account Operators

Administrators

Backup Operators

Pre—Windows 2000 Compatible Access

Print Operators

Server OperatorsGroups in Users container:Groups in Users container:

Domain Admins

Enterprise Admins

Domain Admins

Enterprise Admins

Page 7: Module 8: Implementing Administrative Templates and Audit Policy.

Practice: Assigning User Rights

In this practice, you will:

Assign the Authenticated Users group the right to change the system time

Assign Judy Lew the right to log on locally to the domain controller

Page 8: Module 8: Implementing Administrative Templates and Audit Policy.

Lesson: Using Security Templates to Secure Computers

What Is a Security Policy?

What Are Security Templates?

What Are Security Template Settings?

Windows Server 2003 Security Guide Templates

Windows XP Security Guide Templates

Ways to Deploy Security Templates

Practice: Using Security Templates to Secure Computers

Page 9: Module 8: Implementing Administrative Templates and Audit Policy.

What Is a Security Policy?

Page 10: Module 8: Implementing Administrative Templates and Audit Policy.

What Are Security Templates?

Template Description

Setup security.inf Default security settings

DC security.inf Default security settings for a domain controller

Compatws.inf Modifies permissions and registry settings for application compatibility

Securedc.inf and Securews.inf

Enhances security settings

Hisecdc.inf and Hisecws.inf Increases the restrictions on security settings

Rootsec.infSpecifies permissions for the root of the system drive

IESacls.infConfigures auditing and permissions on registry keys of Internet Explorer

Page 11: Module 8: Implementing Administrative Templates and Audit Policy.

What Are Security Template Settings?

Security Template: Setup Security

Security Template: Setup Security Sample SettingsSample Settings

Page 12: Module 8: Implementing Administrative Templates and Audit Policy.

Windows Server 2003 Security Guide Templates

The Windows Server 2003 Security Guide provides:The Windows Server 2003 Security Guide provides:

Security documents and checklists

Sample scripts

Security templates for: Legacy Clients Enterprise Clients High Security

Security documents and checklists

Sample scripts

Security templates for: Legacy Clients Enterprise Clients High Security

Page 13: Module 8: Implementing Administrative Templates and Audit Policy.

Windows XP Security Guide Templates

The Windows XP Security Guide provides:The Windows XP Security Guide provides:

Security documents and checklists

Sample scripts

Administrative templates

Security templates for: Enterprise Clients High Security Legacy Clients

Security documents and checklists

Sample scripts

Administrative templates

Security templates for: Enterprise Clients High Security Legacy Clients

Page 14: Module 8: Implementing Administrative Templates and Audit Policy.

Ways to Deploy Security Templates

Page 15: Module 8: Implementing Administrative Templates and Audit Policy.

Practice: Using Security Templates to Secure Computers

In this practice, you will:

Create a security template

Import the security template into a GPO and apply the GPO to an organizational unit

Page 16: Module 8: Implementing Administrative Templates and Audit Policy.

Lesson: Testing Computer Security Policy

What Is the Security Configuration and Analysis Tool?

Practice: Testing a Computer Security Policy

Page 17: Module 8: Implementing Administrative Templates and Audit Policy.

What Is the Security Configuration and Analysis Tool?

Template SettingTemplate Setting Actual SettingActual SettingSetting That Does Not Match TemplateSetting That Does Not Match Template

Page 18: Module 8: Implementing Administrative Templates and Audit Policy.

Practice: Testing a Computer Security Policy

In this practice, you will analyze a computer’s security policy by using a security template

Page 19: Module 8: Implementing Administrative Templates and Audit Policy.

Lesson: Configuring Auditing

What Is Auditing?

What Is an Audit Policy?

Types of Events to Audit

Guidelines for Planning an Audit Policy

Practice: Configuring Auditing

Best Practices for Configuring Auditing

Page 20: Module 8: Implementing Administrative Templates and Audit Policy.

What Is Auditing?

Auditing tracks user and operating system activities and records selected events in security logs

Enable auditing to:

Create a baseline

Detect threats and attacks

Determine damages

Prevent further damage

Audit access to objects, management of accounts, and users logging on and logging off

What occurred?What occurred? When?When?Who did it?Who did it?

What was the result?What was the result?

Page 21: Module 8: Implementing Administrative Templates and Audit Policy.

What Is an Audit Policy?

An audit policy determines the security events that will be reported to the network administrator

Set up an audit policy to:

Track success or failure of events

Minimize unauthorized use of resources

Maintain a record of activity

Security events are stored in security logs

Page 22: Module 8: Implementing Administrative Templates and Audit Policy.

Types of Events to Audit

Account Logon

Account Management

Directory Service Access

Logon

Object Access

Policy Change

Privilege Use

Process Tracking

System

Page 23: Module 8: Implementing Administrative Templates and Audit Policy.

Guidelines for Planning an Audit Policy

Determine the computers to set up auditing onDetermine the computers to set up auditing on

Determine which events to auditDetermine which events to audit

Determine whether to audit success or failure eventsDetermine whether to audit success or failure events

Determine whether to track trendsDetermine whether to track trends

Review security logs frequentlyReview security logs frequently

Page 24: Module 8: Implementing Administrative Templates and Audit Policy.

Practice: Configuring Auditing

In this practice, you will create a GPO to enable auditing for files and folders

Page 25: Module 8: Implementing Administrative Templates and Audit Policy.

Best Practices for Configuring Auditing

Audit success events in the directory service access categoryAudit success events in the directory service access category

Audit success events in the object access categoryAudit success events in the object access category

Audit success and failure events in the system categoryAudit success and failure events in the system category

Audit success and failure events in the policy change category on domain controllersAudit success and failure events in the policy change category on domain controllers

Audit success and failure events in the account management categoryAudit success and failure events in the account management category

Audit success events in the logon categoryAudit success events in the logon category

Audit success events in the account logon category on domain controllersAudit success events in the account logon category on domain controllers

Page 26: Module 8: Implementing Administrative Templates and Audit Policy.

Lesson: Managing Security Logs

Types of Log Files

Common Security Events

Tasks Associated with Managing the Security Log Files

Practice: Managing Security Logs

Page 27: Module 8: Implementing Administrative Templates and Audit Policy.

Types of Log Files

The following logs are available in Event Viewer:ApplicationSecuritySystemDirectory serviceFile Replication service

Page 28: Module 8: Implementing Administrative Templates and Audit Policy.

Common Security Events

Logon Event description

Event ID 528 Successful logon

Event ID 529 Unsuccessful logon attempt

Event ID 539 Attempts to log on to a locked out account

Security Log Event description

Event ID 517 Security log cleared

Shutdown Event description

Event ID 513 System is shut down

Page 29: Module 8: Implementing Administrative Templates and Audit Policy.

Tasks Associated with Managing the Security Log Files

Page 30: Module 8: Implementing Administrative Templates and Audit Policy.

Practice: Managing Security Logs

In this practice, you will:

Configure security log properties

Create a security log filter that filters the failure events for Don Hall

Page 31: Module 8: Implementing Administrative Templates and Audit Policy.

Lab: Managing Security Settings

In this lab, you will:

Create a custom security template

Import and deploy the custom template