Chapter 6. Auditing and Monitoring Your Perimeter Network

Systems in a perimeter network need constant monitoring. It’s crucial to detect abnormal behavior promptly, since such behavior might indicate a break-in or maybe just an unintentional configuration change that weakens the security of the system. This chapter discusses how to implement a strong system monitoring solution on Windows. This includes configuring the standard Windows NT event logging and auditing systems; however, these built-in features do not satisfy the security needs of a perimeter network. Additional steps include:

  • Setting up remote logging to get all the log information collected at a dedicated and secure log server

  • Synchronizing the system clocks in the network to a trusted time source

  • Configuring integrity checking software to complement the NT auditing system

Remember that many of the settings discussed in this chapter can be configured using the Security Configuration Editor (SCE) described in Chapter 2.

System Auditing in Windows

The auditing system in Windows is very good. It’s possible to audit every type of object access in a granular way. An object in Windows NT is anything from a filesystem object (e.g., file or directory) to a printer, registry key, or internal operating system data structure. For instance, it is possible to set up auditing for a single action (e.g., read or write) on a single file for a certain user. System Access Control Lists (SACLs) control how an object is audited.

The Security ...

Get Securing Windows NT/2000 Servers for the Internet now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.