SlideShare a Scribd company logo
1 of 2
Download to read offline
What basic auditing policy logs attempts to authenticate a user through a domain controller or a
local Security Accounts Manager?
Solution
“Audit Logon Events” are meant for monitoring the logon/logoff events, and are disabled by
default. It is required to enable these policies manually. The basic auditing policy are:
It aslo depends on system to system. For windows there are category and sub category for
auditing .
for ex: Account Logon,Account Management,Detailed Tracking,DS Access ect. This further has
subcategory.
Events to Monitor
A perfect event ID to generate a security alert should contain the following attributes:
High likelihood that occurrence indicates unauthorized activity
Low number of false positives
Occurrence should result in an investigative/forensics response
Two types of events should be monitored and alerted:
Those events in which even a single occurrence indicates unauthorized activity
An accumulation of events above an expected and accepted baseline
An example of the first event is:
If Domain Admins (DAs) are forbidden from logging on to computers that are not domain
controllers, a single occurrence of a DA member logging on to an end-user workstation should
generate an alert and be investigated. This type of alert is easy to generate by using the Audit
Special Logon event 4964 (Special groups have been assigned to a new logon). Other examples
of single instance alerts include:
If Server A should never connect to Server B, alert when they connect to each other.
Alert if a normal end-user account is unexpectedly added to a sensitive security group.
If employees in factory location A never work at night, alert when a user logs on at midnight.
Alert if an unauthorized service is installed on a domain controller.
Investigate if a regular end-user attempts to directly log on to a SQL Server for which they have
no clear reason for doing so.
If you have no members in your DA group, and someone adds themselves there, check it
immediately.
An example of the second event is:
An aberrant number of failed logons could indicate a password guessing attack. For an enterprise
to provide an alert for an unusually high number of failed logons, they must first understand the
normal levels of failed logons within their environment prior to a malicious security event.
----------end-----------

More Related Content

Similar to What basic auditing policy logs attempts to authenticate a user thro.pdf

Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident responsepersons20ar
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRAbhishek Sood
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident responsepersons20ar
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemTheodore Le
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident responsepersons20ar
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWinfosec train
 
Activity visibility
Activity visibilityActivity visibility
Activity visibilityhardik soni
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdffashiionbeutycare
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
Detecting Windows horizontal password guessing attacks in near real-time
Detecting Windows horizontal password guessing attacks in near real-timeDetecting Windows horizontal password guessing attacks in near real-time
Detecting Windows horizontal password guessing attacks in near real-timePortcullis Computer Security
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...Anton Chuvakin
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementNetwrix Corporation
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
 
CIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfCIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfNesterWare
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3grimesjo
 

Similar to What basic auditing policy logs attempts to authenticate a user thro.pdf (20)

Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPR
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
ProjectReport_Finalversion
ProjectReport_FinalversionProjectReport_Finalversion
ProjectReport_Finalversion
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
CISA (1).pdf
CISA (1).pdfCISA (1).pdf
CISA (1).pdf
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
 
Activity visibility
Activity visibilityActivity visibility
Activity visibility
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
 
Detecting windows horizontal password blog
Detecting windows horizontal password blogDetecting windows horizontal password blog
Detecting windows horizontal password blog
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Detecting Windows horizontal password guessing attacks in near real-time
Detecting Windows horizontal password guessing attacks in near real-timeDetecting Windows horizontal password guessing attacks in near real-time
Detecting Windows horizontal password guessing attacks in near real-time
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Heartland
HeartlandHeartland
Heartland
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout Management
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
CIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfCIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdf
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 

More from jeeteshmalani1

How can you define the traits below and what are your thoughts on th.pdf
How can you define the traits below and what are your thoughts on th.pdfHow can you define the traits below and what are your thoughts on th.pdf
How can you define the traits below and what are your thoughts on th.pdfjeeteshmalani1
 
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdf
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdffrank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdf
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdfjeeteshmalani1
 
Does law provide liberty What is law How does law tend to be perve.pdf
Does law provide liberty What is law How does law tend to be perve.pdfDoes law provide liberty What is law How does law tend to be perve.pdf
Does law provide liberty What is law How does law tend to be perve.pdfjeeteshmalani1
 
Consider two n times n matrices C and D that commute under matrix mul.pdf
Consider two n times n matrices C and D that commute under matrix mul.pdfConsider two n times n matrices C and D that commute under matrix mul.pdf
Consider two n times n matrices C and D that commute under matrix mul.pdfjeeteshmalani1
 
Can someone help me setup this in JAVA Im new to java. Thanks.pdf
Can someone help me setup this in JAVA Im new to java. Thanks.pdfCan someone help me setup this in JAVA Im new to java. Thanks.pdf
Can someone help me setup this in JAVA Im new to java. Thanks.pdfjeeteshmalani1
 
atify and describe the cult alue dimensions that help ural profile of.pdf
atify and describe the cult alue dimensions that help ural profile of.pdfatify and describe the cult alue dimensions that help ural profile of.pdf
atify and describe the cult alue dimensions that help ural profile of.pdfjeeteshmalani1
 
21. Assume that mutations in the transformer (tra) and the male- spec.pdf
21. Assume that mutations in the transformer (tra) and the male- spec.pdf21. Assume that mutations in the transformer (tra) and the male- spec.pdf
21. Assume that mutations in the transformer (tra) and the male- spec.pdfjeeteshmalani1
 
Write one Conditional Signal Assignment VHDL code statement in the b.pdf
Write one Conditional Signal Assignment VHDL code statement in the b.pdfWrite one Conditional Signal Assignment VHDL code statement in the b.pdf
Write one Conditional Signal Assignment VHDL code statement in the b.pdfjeeteshmalani1
 
Write a two- to three- page paper responding to the questions at the.pdf
Write a two- to three- page paper responding to the questions at the.pdfWrite a two- to three- page paper responding to the questions at the.pdf
Write a two- to three- page paper responding to the questions at the.pdfjeeteshmalani1
 
1. Match the following. DOE is pursuing the demonstration of one suc.pdf
1. Match the following. DOE is pursuing the demonstration of one suc.pdf1. Match the following. DOE is pursuing the demonstration of one suc.pdf
1. Match the following. DOE is pursuing the demonstration of one suc.pdfjeeteshmalani1
 
Which of the following involve an increase in the entropy of the sys.pdf
Which of the following involve an increase in the entropy of the sys.pdfWhich of the following involve an increase in the entropy of the sys.pdf
Which of the following involve an increase in the entropy of the sys.pdfjeeteshmalani1
 
Which of the following was true about the Great Depression in th.pdf
Which of the following was true about the Great Depression in th.pdfWhich of the following was true about the Great Depression in th.pdf
Which of the following was true about the Great Depression in th.pdfjeeteshmalani1
 
What are the major concerns for corporations in developing and re.pdf
What are the major concerns for corporations in developing and re.pdfWhat are the major concerns for corporations in developing and re.pdf
What are the major concerns for corporations in developing and re.pdfjeeteshmalani1
 
Which factors might account for the specificity of certain viruses f.pdf
Which factors might account for the specificity of certain viruses f.pdfWhich factors might account for the specificity of certain viruses f.pdf
Which factors might account for the specificity of certain viruses f.pdfjeeteshmalani1
 
What is a warrant in Toulmins model of a syllogismA) A legal do.pdf
What is a warrant in Toulmins model of a syllogismA) A legal do.pdfWhat is a warrant in Toulmins model of a syllogismA) A legal do.pdf
What is a warrant in Toulmins model of a syllogismA) A legal do.pdfjeeteshmalani1
 
What are the main methods anthropologists use Give an example of ho.pdf
What are the main methods anthropologists use Give an example of ho.pdfWhat are the main methods anthropologists use Give an example of ho.pdf
What are the main methods anthropologists use Give an example of ho.pdfjeeteshmalani1
 
Arrange the following parts and processes of eukaryotic gene expressi.pdf
Arrange the following parts and processes of eukaryotic gene expressi.pdfArrange the following parts and processes of eukaryotic gene expressi.pdf
Arrange the following parts and processes of eukaryotic gene expressi.pdfjeeteshmalani1
 
The polarization of the CMB detected in the WMAP data is evidence fo.pdf
The polarization of the CMB detected in the WMAP data is evidence fo.pdfThe polarization of the CMB detected in the WMAP data is evidence fo.pdf
The polarization of the CMB detected in the WMAP data is evidence fo.pdfjeeteshmalani1
 
Technical Performance Measures are quantitative measures that must be.pdf
Technical Performance Measures are quantitative measures that must be.pdfTechnical Performance Measures are quantitative measures that must be.pdf
Technical Performance Measures are quantitative measures that must be.pdfjeeteshmalani1
 
Show that the center Z(D) of a division ring D is a field.Solutio.pdf
Show that the center Z(D) of a division ring D is a field.Solutio.pdfShow that the center Z(D) of a division ring D is a field.Solutio.pdf
Show that the center Z(D) of a division ring D is a field.Solutio.pdfjeeteshmalani1
 

More from jeeteshmalani1 (20)

How can you define the traits below and what are your thoughts on th.pdf
How can you define the traits below and what are your thoughts on th.pdfHow can you define the traits below and what are your thoughts on th.pdf
How can you define the traits below and what are your thoughts on th.pdf
 
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdf
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdffrank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdf
frank has klinefelter syndrome (47, XXY)... Frank has Klinefelter sy.pdf
 
Does law provide liberty What is law How does law tend to be perve.pdf
Does law provide liberty What is law How does law tend to be perve.pdfDoes law provide liberty What is law How does law tend to be perve.pdf
Does law provide liberty What is law How does law tend to be perve.pdf
 
Consider two n times n matrices C and D that commute under matrix mul.pdf
Consider two n times n matrices C and D that commute under matrix mul.pdfConsider two n times n matrices C and D that commute under matrix mul.pdf
Consider two n times n matrices C and D that commute under matrix mul.pdf
 
Can someone help me setup this in JAVA Im new to java. Thanks.pdf
Can someone help me setup this in JAVA Im new to java. Thanks.pdfCan someone help me setup this in JAVA Im new to java. Thanks.pdf
Can someone help me setup this in JAVA Im new to java. Thanks.pdf
 
atify and describe the cult alue dimensions that help ural profile of.pdf
atify and describe the cult alue dimensions that help ural profile of.pdfatify and describe the cult alue dimensions that help ural profile of.pdf
atify and describe the cult alue dimensions that help ural profile of.pdf
 
21. Assume that mutations in the transformer (tra) and the male- spec.pdf
21. Assume that mutations in the transformer (tra) and the male- spec.pdf21. Assume that mutations in the transformer (tra) and the male- spec.pdf
21. Assume that mutations in the transformer (tra) and the male- spec.pdf
 
Write one Conditional Signal Assignment VHDL code statement in the b.pdf
Write one Conditional Signal Assignment VHDL code statement in the b.pdfWrite one Conditional Signal Assignment VHDL code statement in the b.pdf
Write one Conditional Signal Assignment VHDL code statement in the b.pdf
 
Write a two- to three- page paper responding to the questions at the.pdf
Write a two- to three- page paper responding to the questions at the.pdfWrite a two- to three- page paper responding to the questions at the.pdf
Write a two- to three- page paper responding to the questions at the.pdf
 
1. Match the following. DOE is pursuing the demonstration of one suc.pdf
1. Match the following. DOE is pursuing the demonstration of one suc.pdf1. Match the following. DOE is pursuing the demonstration of one suc.pdf
1. Match the following. DOE is pursuing the demonstration of one suc.pdf
 
Which of the following involve an increase in the entropy of the sys.pdf
Which of the following involve an increase in the entropy of the sys.pdfWhich of the following involve an increase in the entropy of the sys.pdf
Which of the following involve an increase in the entropy of the sys.pdf
 
Which of the following was true about the Great Depression in th.pdf
Which of the following was true about the Great Depression in th.pdfWhich of the following was true about the Great Depression in th.pdf
Which of the following was true about the Great Depression in th.pdf
 
What are the major concerns for corporations in developing and re.pdf
What are the major concerns for corporations in developing and re.pdfWhat are the major concerns for corporations in developing and re.pdf
What are the major concerns for corporations in developing and re.pdf
 
Which factors might account for the specificity of certain viruses f.pdf
Which factors might account for the specificity of certain viruses f.pdfWhich factors might account for the specificity of certain viruses f.pdf
Which factors might account for the specificity of certain viruses f.pdf
 
What is a warrant in Toulmins model of a syllogismA) A legal do.pdf
What is a warrant in Toulmins model of a syllogismA) A legal do.pdfWhat is a warrant in Toulmins model of a syllogismA) A legal do.pdf
What is a warrant in Toulmins model of a syllogismA) A legal do.pdf
 
What are the main methods anthropologists use Give an example of ho.pdf
What are the main methods anthropologists use Give an example of ho.pdfWhat are the main methods anthropologists use Give an example of ho.pdf
What are the main methods anthropologists use Give an example of ho.pdf
 
Arrange the following parts and processes of eukaryotic gene expressi.pdf
Arrange the following parts and processes of eukaryotic gene expressi.pdfArrange the following parts and processes of eukaryotic gene expressi.pdf
Arrange the following parts and processes of eukaryotic gene expressi.pdf
 
The polarization of the CMB detected in the WMAP data is evidence fo.pdf
The polarization of the CMB detected in the WMAP data is evidence fo.pdfThe polarization of the CMB detected in the WMAP data is evidence fo.pdf
The polarization of the CMB detected in the WMAP data is evidence fo.pdf
 
Technical Performance Measures are quantitative measures that must be.pdf
Technical Performance Measures are quantitative measures that must be.pdfTechnical Performance Measures are quantitative measures that must be.pdf
Technical Performance Measures are quantitative measures that must be.pdf
 
Show that the center Z(D) of a division ring D is a field.Solutio.pdf
Show that the center Z(D) of a division ring D is a field.Solutio.pdfShow that the center Z(D) of a division ring D is a field.Solutio.pdf
Show that the center Z(D) of a division ring D is a field.Solutio.pdf
 

Recently uploaded

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

What basic auditing policy logs attempts to authenticate a user thro.pdf

  • 1. What basic auditing policy logs attempts to authenticate a user through a domain controller or a local Security Accounts Manager? Solution “Audit Logon Events” are meant for monitoring the logon/logoff events, and are disabled by default. It is required to enable these policies manually. The basic auditing policy are: It aslo depends on system to system. For windows there are category and sub category for auditing . for ex: Account Logon,Account Management,Detailed Tracking,DS Access ect. This further has subcategory. Events to Monitor A perfect event ID to generate a security alert should contain the following attributes: High likelihood that occurrence indicates unauthorized activity Low number of false positives Occurrence should result in an investigative/forensics response Two types of events should be monitored and alerted: Those events in which even a single occurrence indicates unauthorized activity An accumulation of events above an expected and accepted baseline An example of the first event is: If Domain Admins (DAs) are forbidden from logging on to computers that are not domain controllers, a single occurrence of a DA member logging on to an end-user workstation should generate an alert and be investigated. This type of alert is easy to generate by using the Audit Special Logon event 4964 (Special groups have been assigned to a new logon). Other examples of single instance alerts include: If Server A should never connect to Server B, alert when they connect to each other. Alert if a normal end-user account is unexpectedly added to a sensitive security group. If employees in factory location A never work at night, alert when a user logs on at midnight. Alert if an unauthorized service is installed on a domain controller. Investigate if a regular end-user attempts to directly log on to a SQL Server for which they have no clear reason for doing so. If you have no members in your DA group, and someone adds themselves there, check it immediately. An example of the second event is: An aberrant number of failed logons could indicate a password guessing attack. For an enterprise
  • 2. to provide an alert for an unusually high number of failed logons, they must first understand the normal levels of failed logons within their environment prior to a malicious security event. ----------end-----------