Hi,

I only bring this up because I can't tell you how often I have run into
power users and server administrators trying to debug some application
problem who were convinced they had no "permission" problems - because their
security log showed nothing.

Not only did they not understand that auditing had been off - they had no
idea how to turn it on to trace a problem to its roots.  

Auditing is a key aspect of running a secure system. Shipping a "secure"
operating system with failure auditing turned off borders on a security
vulnerability in my mind.

>> create a huge security log file depending upon the configuration of the
security log file. <<

If by default it would only audit "failure", then the log file should not be
huge at all. I have never set up a machine (server OR workstation) where
failure logging was off and never encountered any log size issues.

In, fact if there ARE failures, then in most cases you do WANT to know about
it. There may be certain folders where you expect "logon" errors, so you
adjust the auditing for those folders.

 By inspecting the security log I've often identified client site problems
(e.g., failed attempts to update web site files by the application) and was
able to fix things for them before they even realized that there WAS a
problem with their web site.

>> Second, auditing can produce a lot of data, even if configured very
narrowly <<

Yes, "success" auditing could.

Best Regards
Andy Schmidt

Phone:  +1 201 934-3414 x20 (Business)
Fax:    +1 201 934-9206 


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John T
(Lists)
Sent: Friday, November 03, 2006 02:37 AM
To: declude.junkmail@declude.com
Subject: RE: [Declude.JunkMail] Can someone help?

> To turn on auditing (which I never understand, why it's not turned on 
> by default in Windows) - MS gives you quite a run-around:

First, in the NT 4.0 days, auditing could easily use up resources and create
a huge security log file depending upon the configuration of the security
log file.

Second, auditing can produce a lot of data, even if configured very
narrowly, that one then has to wade through.

> - Windows Explorer - go to the root directories of each disk, 
> properties, security, Advanced, Auditing, add the "Everyone" user and 
> mark the
"failed"
> checkmarks for the complete list of accesses (I personally also audit 
> successful change permissions and take ownership). Apply this and let 
> it propagate to all subfolders.
> 
> - Local Security Policy - to to "Local Policies", "Audit Policies" and
turn
> on all failures. (I personally also audit successful account 
> management
and
> audit policy changes).

Actually, what I do for my servers and for client, is in the Default domain
policy (local security policy if no domain,) enable those auditing policies
that are appropriate (not all are needed for normal business) AND enable
both success and failure on object access. NOTE that auditing of object
access is the ONLY auditing that requires 2 steps. All other auditing takes
affect without further intervention.

Then, only when needed, (or if by company policy they want to track changes
to files in a particular folder such as say payroll data sheets) I go to the
folders properties that I want to audit and enable auditing again for what
is needed only. Once I am done auditing, I disable on that directory.

John T
eServices For You

"Life is a succession of lessons which must be lived to be understood."
Ralph Waldo Emerson (1802-1882)





---
This E-mail came from the Declude.JunkMail mailing list.  To unsubscribe,
just send an E-mail to [EMAIL PROTECTED], and type "unsubscribe
Declude.JunkMail".  The archives can be found at
http://www.mail-archive.com.





---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.

Reply via email to