Onsite or Remote Support
Call (519) 573-3759
Continuously auditing the activity in your network is one of the most critical security best practice, since it helps you notice
potentially malicious activity early enough to take action and prevent data breaches, system downtime and compliance failures.
Event Logs and Event Log Forwarding
Event logs record the activity on a particular computer. When you configure auditing properly, almost all events that have security significance are logged. This makes event logs the first thing to look at during IT security investigations. Here are two important tips:
Event Log Forwarding
You should also move event logs off your computers regularly, because attackers often scrub event logs to escape detection. Windows Server’s event log forwarding feature enables you to automatically forward events logs from all your computers to a designated machine (the event collector) that stores them all securely. There are two types of event subscriptions:
Source-initiated subscriptions allow you to define an event subscription on the event collector computer without defining the source computers. Then you use Group Policy to control which source computers forward events to the event collector.
Collector-initiated subscriptions allow you to create an event subscription that specifies the source computers that will forward event logs.
Auditing and Advanced Auditing
Auditing policies enable you to record a variety of activities to the Windows security log. You then can examine these auditing logs to identify issues that need further investigation. Auditing successful activities provides documentation of changes so you can troubleshoot which changes led to a failure or a breach. Logging failed attempts can spot malicious hackers or unauthorized users to access enterprise resources
Your auditing policy specifies the categories of security-related events that you want to audit. Here are the basic policy settings you can configure and what happens if you turn them on:
Advanced Audit Policy
Since Windows Server 2008 R2, administrators can audit more specific events using advanced audit policy settings in the following categories:
Audit Collection Services
Windows Server provides a tool for pulling security logs from servers running Windows Server to a centralized location in order to simplify security auditing and log analysis — Audit Collection Services (ACS). ACS is an agent-based utility that aggregates the logs into a Microsoft SQL Server database.
By default, when an audit policy is implemented on a Windows-based computer, that computer automatically saves all events generated by the audit policy to its local security log. Using ACS, organizations can consolidate all those individual security logs into a centrally managed database, and then filter and analyze the events using the data analysis and reporting tools in Microsoft SQL Server.
Windows PowerShell Logging
Administrators can use Windows PowerShell to enable or disable logging at the Windows PowerShell module level. By default, all logging in Windows PowerShell is disabled. You can enable it by setting the “LogPipelineExecutionDetails” property to “$true”; to disable it again, set the property back to “$false”.
Windows PowerShell also offers a detailed script tracing feature that makes it possible to enable detailed tracking and analysis of the use of Windows PowerShell scripting on a system. If you enable detailed script tracing, Windows PowerShell logs all script blocks to the Event Tracing for Windows (ETW) event log in the “Microsoft-Windows-PowerShell/Operational” path.