SlideShare a Scribd company logo
1 of 4
Download to read offline
Solution Overview                                                                    WWW.SYMSURE.COM




Windows Security Log
Monitoring


Windows Security Logs                                                Audit Policies
In most Windows environments audit logs are underutilized.           Auditing for security events on critical computer systems is
They are often examined only for investigation purposes and          an essential requirement of a sound security policy. A
usually after an incident. However Windows logs, when                Windows audit policy defines which security events have
properly configured and efficiently monitored, have                  success and/or failure actions audited and recorded in the
tremendous value.                                                    Security log. For example, Windows 2003 has nine audit
                                                                     policies but by default only two are enabled.
System logging generates vast amount of data from varying
sources. As a result, the process of consolidating, inspecting       • Account log-on events: success auditing
and analyzing them may be tedious and inefficient. The
                                                                     • Log-on events: success auditing
challenges are compounded by inadequate configuration
resulting in logs being full, overwritten, incomplete and useless.
                                                                     The other audit categories (management events, directory
                                                                     service access, object access, policy change, privilege use,
There are solutions available to facilitate the consolidation
                                                                     process tracking, and system events) are configured for no
and aggregation of both local and remote logs from across
                                                                     auditing. Each organization has to determine their security
the organization using either software tools or hardware
                                                                     posture and enable auditing accordingly. Whatever the
appliances. Missing in current log analysis solutions is the
                                                                     configuration in their infrastructure, effective log analysis and
ability to intelligently filter out pertinent information required
                                                                     monitoring is required to ensure that security, risks, and
to determine high risk activities, sending notifications to the
                                                                     control objectives can be achieved.
relevant people, regardless of their technical ability,
documenting issue resolution and establishing workflow to
escalating issues as required.
SymSure Solution
Our solution focuses on automating analysis, reporting, alerts and issues management within the organization’s Windows
logging environment. As outlined in Figure 1, audit policies are configured and pushed via Group Policies to clients and
servers within the environment. The resulting logs are collated to a centralized SymSure server for analysis and
interrogation. Once completed, SymSure’s monitoring framework examines all electronic activities to detect reportable
events and alert the relevant individuals.




                                                         Lo
                                                            gs
                                                               &   Se                                                                SymSure® Framework
                            Windows Client                              tti
                                                                              ng
                                                                                   s                                                  Risk and Control Definitions
                                                                                                                                      Rules Development Center
                               Logs &
                                      S   ettings                                                                                             Alert Systems
                                                                                                                        Issues
   Windows Client                                                                                                                            Issues Routing
                                                                                                                                           Escalation of Issues
                                                                                                                                        Schedule Management
                                                                                                                                                Trending
                                           s
                                    Setting                                             SymSure Application Server                               Reports
                             Logs &                                                                                                            Dashboards

                                                                   gs
                                                                                                  s




                                                               ttin
                                                                                                ng




                                                           e
                                                        &S
                                                                                             tti




                                                    s
                                                                                        Se




                                                g
                                             Lo
                                                                                         &
                                                                                      gs




 Windows Server
                                                                                   Lo




                    Windows Server
                                                    Active Directory (AD)
                                                     Domain Controller



                                                    Figure 1 – Windows Event Monitoring




SymSure Workflow and Reporting

When relevant events or sequence of events are detected,                                              Standard dashboards are included in the framework:
alerts are triggered and a stringent remediation process is
followed to ensure that high risk activities are addressed as                                         • Trending of results across dates
stipulated by the company’s security policies.                                                        • Grouping by risk ranking
                                                                                                      • Grouping by status (new, pending, overdue, etc.)
Other key aspects of the solution are the automation of
reporting and visualization of the control environment.                                               • Comparisons across networks and users




                                                                   2          SOLUTION OVERVIEW
Sample Reports and Alerts
Activity Based Alerts
      Failed file share access attempts
      New accounts created
      Policy creation and amendments to existing policies
      Access of system resources by persons on vacation
      Access of system resources at unusual times by persons on vacation
      Identify persons added to specified groups, e.g. VPN, Administrator, Consultants,
      System Users etc
      Domain Controller added
      Identify users with multiple forced locks in a short period of time
      Identify logon attempts to restricted workstations
      Identify logon attempts with an invalid logon type
      Identify logon attempt with expired passwords and no password change
      Identify logon attempts by disabled accounts
      Identify attempted logon using expired accounts
      Identify new logon with special privileges assigned
      Logon success using a service account at console
      Re-enabled accounts
      Identify attempted logon by unrecognized domain names
      Failed Radius Server Authentication
      Identify attempts to logon with default administrator account
      Logon failure with the Administrator username but unknown domain
      Identify batch logons by accounts assigned to persons
      Users with passwords older than the required password life
      Users with Remote Access Server Dial-in enabled
      Dormant Computer Accounts
      Identify users granted new ways to logon to computers
Active Directory Configuration Alerts
     Accounts that have never logged in
     Accounts that have expired
     Users not required to change passwords
     Use of service accounts. Accounts not tied to a specific user but used by a group
     Identify users/foreign objects in Domain Controller groups
     Identify servers without logging enabled
     Identify ex-employees with active accounts
     Changes to user accounts
     Identify group changes (other than deletion, creation, or membership change)
     Identify changes to Security Enabled Universal Groups
     Identify changes in Domain and Forest Trust Relationships




                                         3   SOLUTION OVERVIEW
Figure 1 – SymSure Monitoring Business Process


Benefits
  Business Challenge                                                 SymSure Solution
  STAKEHOLDERS’ REQUIREMENTS
  Escalating risk and compliance requirements                        • Provide enterprise wide definition and
                                                                       monitoring of controls and assurances that
                                                                       they are effectively implemented across all
                                                                       business processes

  AUTOMATION
  Automating control breach detection and remediation                • Detects breaches at the data source
                                                                     • Distributes results across the enterprise by
                                                                       customer-defined rules via dashboards,
                                                                       e-mail, SMS
                                                                     • Provides workflow for remediation including
                                                                       automatic detection of resolution of errors
                                                                     • Allows the user to define controls in multiple
                                                                       business processes with a consolidated view
                                                                     • Increases efficiency by making analytics
                                                                       repeatable with the ability to adjust tolerances
                                                                     • Business rules and parameters are
                                                                       customizable and new logic can be built by
                                                                       the organization
                                                                     • Monitoring can also be applied to business
                                                                       metrics
                                                                     • Issues are identified as soon as they occur

  INTEGRATION
  Seamlessly integrate into existing solutions                       • No changes required to underlying systems
                                                                       being monitored
                                                                     • Non-intrusive access to data and cannot
                                                                       amend source data
                                                                     • User and group security with LDAP support
                                                                     • Strong encryption

  PROCESS OPTIMIZATION
  Makes the process more efficient and less costly                   • Issues detected more timely
                                                                     • Lower recovery costs
                                                                     • Greater level of automation
                                                                     • Compliance and other reporting automatically
                                                                       generated
                                                                     • Knowledge and expertise captured in the
                                                                       control systems and made repeatable




Copyright © 2009 SymSure Limited.
All rights reserved. No part of this manual may be transmitted, in
any form or by any means (photocopying, electronic, mechanical,
recording or otherwise) or reproduced, stored in a retrieval
system, without permission in writing from the publisher.
All trademarks are the property of their respective companies.

                                                                                             CONTACT US:
                                                                                             + 1 416 530 4567
                                                                                             email: info@symsure.com

More Related Content

Similar to Sym Sure Windows Log Monitoring

Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity PlanningManaged Networks
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityTripwire
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...akquinet enterprise solutions GmbH
 
Monitoring An Enterprise Uc Environment
Monitoring An Enterprise Uc EnvironmentMonitoring An Enterprise Uc Environment
Monitoring An Enterprise Uc EnvironmentLanair
 
Sym Sure Loan Portfolio
Sym Sure Loan PortfolioSym Sure Loan Portfolio
Sym Sure Loan Portfoliojjfrec07
 
TalaTek Enterprise Compliance Management Solution
TalaTek Enterprise Compliance Management SolutionTalaTek Enterprise Compliance Management Solution
TalaTek Enterprise Compliance Management SolutionBaan
 
AMSYS - Applicable Management Systems
AMSYS - Applicable Management SystemsAMSYS - Applicable Management Systems
AMSYS - Applicable Management SystemsBjoern Bartels
 
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderSession Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderBMST
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET Journal
 
Rim Gtl Server Management
Rim Gtl Server ManagementRim Gtl Server Management
Rim Gtl Server Managementsonnysonare
 
A Short PMML Tutorial by LatentView
A Short PMML Tutorial by LatentViewA Short PMML Tutorial by LatentView
A Short PMML Tutorial by LatentViewramesh.latentview
 
Prov International - Our Service-Now ITOM Delivery Capabilities
Prov International - Our Service-Now ITOM Delivery CapabilitiesProv International - Our Service-Now ITOM Delivery Capabilities
Prov International - Our Service-Now ITOM Delivery CapabilitiesSonny Nnamchi (Ph.D)
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSxmeteorite
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSxmeteorite
 
Log Management Tool Market size,key trends .pdf
Log Management Tool Market size,key trends .pdfLog Management Tool Market size,key trends .pdf
Log Management Tool Market size,key trends .pdfshreyaporekar9
 
Sym Sure Loan Portfolio
Sym Sure Loan PortfolioSym Sure Loan Portfolio
Sym Sure Loan Portfoliojjfrec07
 

Similar to Sym Sure Windows Log Monitoring (20)

Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...What if a hacker has already broken in when your IT auditor is at the door? H...
What if a hacker has already broken in when your IT auditor is at the door? H...
 
ams_brochure
ams_brochureams_brochure
ams_brochure
 
Monitoring An Enterprise Uc Environment
Monitoring An Enterprise Uc EnvironmentMonitoring An Enterprise Uc Environment
Monitoring An Enterprise Uc Environment
 
Sym Sure Loan Portfolio
Sym Sure Loan PortfolioSym Sure Loan Portfolio
Sym Sure Loan Portfolio
 
TalaTek Enterprise Compliance Management Solution
TalaTek Enterprise Compliance Management SolutionTalaTek Enterprise Compliance Management Solution
TalaTek Enterprise Compliance Management Solution
 
AMSYS - Applicable Management Systems
AMSYS - Applicable Management SystemsAMSYS - Applicable Management Systems
AMSYS - Applicable Management Systems
 
Session Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior RecorderSession Auditor - Transparent Network Behavior Recorder
Session Auditor - Transparent Network Behavior Recorder
 
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...IRJET-  	  A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
IRJET- A Detailed Analysis on Windows Event Log Viewer for Faster Root Ca...
 
Rim Gtl Server Management
Rim Gtl Server ManagementRim Gtl Server Management
Rim Gtl Server Management
 
A Short PMML Tutorial by LatentView
A Short PMML Tutorial by LatentViewA Short PMML Tutorial by LatentView
A Short PMML Tutorial by LatentView
 
.The Complete Guide to Log and Event Management
.The Complete Guide to Log and Event Management.The Complete Guide to Log and Event Management
.The Complete Guide to Log and Event Management
 
Prov International - Our Service-Now ITOM Delivery Capabilities
Prov International - Our Service-Now ITOM Delivery CapabilitiesProv International - Our Service-Now ITOM Delivery Capabilities
Prov International - Our Service-Now ITOM Delivery Capabilities
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
 
SecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaSSecureGRC - Cloud based SaaS
SecureGRC - Cloud based SaaS
 
The Information Office
The Information OfficeThe Information Office
The Information Office
 
Log Management Tool Market size,key trends .pdf
Log Management Tool Market size,key trends .pdfLog Management Tool Market size,key trends .pdf
Log Management Tool Market size,key trends .pdf
 
Scm awareness
Scm awarenessScm awareness
Scm awareness
 
Sym Sure Loan Portfolio
Sym Sure Loan PortfolioSym Sure Loan Portfolio
Sym Sure Loan Portfolio
 

Sym Sure Windows Log Monitoring

  • 1. Solution Overview WWW.SYMSURE.COM Windows Security Log Monitoring Windows Security Logs Audit Policies In most Windows environments audit logs are underutilized. Auditing for security events on critical computer systems is They are often examined only for investigation purposes and an essential requirement of a sound security policy. A usually after an incident. However Windows logs, when Windows audit policy defines which security events have properly configured and efficiently monitored, have success and/or failure actions audited and recorded in the tremendous value. Security log. For example, Windows 2003 has nine audit policies but by default only two are enabled. System logging generates vast amount of data from varying sources. As a result, the process of consolidating, inspecting • Account log-on events: success auditing and analyzing them may be tedious and inefficient. The • Log-on events: success auditing challenges are compounded by inadequate configuration resulting in logs being full, overwritten, incomplete and useless. The other audit categories (management events, directory service access, object access, policy change, privilege use, There are solutions available to facilitate the consolidation process tracking, and system events) are configured for no and aggregation of both local and remote logs from across auditing. Each organization has to determine their security the organization using either software tools or hardware posture and enable auditing accordingly. Whatever the appliances. Missing in current log analysis solutions is the configuration in their infrastructure, effective log analysis and ability to intelligently filter out pertinent information required monitoring is required to ensure that security, risks, and to determine high risk activities, sending notifications to the control objectives can be achieved. relevant people, regardless of their technical ability, documenting issue resolution and establishing workflow to escalating issues as required.
  • 2. SymSure Solution Our solution focuses on automating analysis, reporting, alerts and issues management within the organization’s Windows logging environment. As outlined in Figure 1, audit policies are configured and pushed via Group Policies to clients and servers within the environment. The resulting logs are collated to a centralized SymSure server for analysis and interrogation. Once completed, SymSure’s monitoring framework examines all electronic activities to detect reportable events and alert the relevant individuals. Lo gs & Se SymSure® Framework Windows Client tti ng s Risk and Control Definitions Rules Development Center Logs & S ettings Alert Systems Issues Windows Client Issues Routing Escalation of Issues Schedule Management Trending s Setting SymSure Application Server Reports Logs & Dashboards gs s ttin ng e &S tti s Se g Lo & gs Windows Server Lo Windows Server Active Directory (AD) Domain Controller Figure 1 – Windows Event Monitoring SymSure Workflow and Reporting When relevant events or sequence of events are detected, Standard dashboards are included in the framework: alerts are triggered and a stringent remediation process is followed to ensure that high risk activities are addressed as • Trending of results across dates stipulated by the company’s security policies. • Grouping by risk ranking • Grouping by status (new, pending, overdue, etc.) Other key aspects of the solution are the automation of reporting and visualization of the control environment. • Comparisons across networks and users 2 SOLUTION OVERVIEW
  • 3. Sample Reports and Alerts Activity Based Alerts Failed file share access attempts New accounts created Policy creation and amendments to existing policies Access of system resources by persons on vacation Access of system resources at unusual times by persons on vacation Identify persons added to specified groups, e.g. VPN, Administrator, Consultants, System Users etc Domain Controller added Identify users with multiple forced locks in a short period of time Identify logon attempts to restricted workstations Identify logon attempts with an invalid logon type Identify logon attempt with expired passwords and no password change Identify logon attempts by disabled accounts Identify attempted logon using expired accounts Identify new logon with special privileges assigned Logon success using a service account at console Re-enabled accounts Identify attempted logon by unrecognized domain names Failed Radius Server Authentication Identify attempts to logon with default administrator account Logon failure with the Administrator username but unknown domain Identify batch logons by accounts assigned to persons Users with passwords older than the required password life Users with Remote Access Server Dial-in enabled Dormant Computer Accounts Identify users granted new ways to logon to computers Active Directory Configuration Alerts Accounts that have never logged in Accounts that have expired Users not required to change passwords Use of service accounts. Accounts not tied to a specific user but used by a group Identify users/foreign objects in Domain Controller groups Identify servers without logging enabled Identify ex-employees with active accounts Changes to user accounts Identify group changes (other than deletion, creation, or membership change) Identify changes to Security Enabled Universal Groups Identify changes in Domain and Forest Trust Relationships 3 SOLUTION OVERVIEW
  • 4. Figure 1 – SymSure Monitoring Business Process Benefits Business Challenge SymSure Solution STAKEHOLDERS’ REQUIREMENTS Escalating risk and compliance requirements • Provide enterprise wide definition and monitoring of controls and assurances that they are effectively implemented across all business processes AUTOMATION Automating control breach detection and remediation • Detects breaches at the data source • Distributes results across the enterprise by customer-defined rules via dashboards, e-mail, SMS • Provides workflow for remediation including automatic detection of resolution of errors • Allows the user to define controls in multiple business processes with a consolidated view • Increases efficiency by making analytics repeatable with the ability to adjust tolerances • Business rules and parameters are customizable and new logic can be built by the organization • Monitoring can also be applied to business metrics • Issues are identified as soon as they occur INTEGRATION Seamlessly integrate into existing solutions • No changes required to underlying systems being monitored • Non-intrusive access to data and cannot amend source data • User and group security with LDAP support • Strong encryption PROCESS OPTIMIZATION Makes the process more efficient and less costly • Issues detected more timely • Lower recovery costs • Greater level of automation • Compliance and other reporting automatically generated • Knowledge and expertise captured in the control systems and made repeatable Copyright © 2009 SymSure Limited. All rights reserved. No part of this manual may be transmitted, in any form or by any means (photocopying, electronic, mechanical, recording or otherwise) or reproduced, stored in a retrieval system, without permission in writing from the publisher. All trademarks are the property of their respective companies. CONTACT US: + 1 416 530 4567 email: info@symsure.com