S 2.365 Planning of system monitoring under Windows Server 2003

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

Numerous and extensive event logs are created when operating Windows Server 2003. These logs are primarily used to verify and maintain proper operation, but also for analysing errors. They often serve as the basis for audits or additional evaluations.

The contents of the logs are used to determine the storage periods and the legal aspects relating to data protection to take into account. The basic principles of logging should conform to the legal requirements, and the misuse of log data and of the threats and risks arising in connection with its misuse are to be minimised. (see S 5.9 Logging on the server, S 2.64 Checking the log files, S 2.110 Data protection guidelines for logging procedures).

Basic monitoring and logging principles

Monitoring policy

Based on the security policy for the Windows Server 2003 to be monitored, a monitoring policy must be derived and implemented for the server. The monitoring policy should define which events are to be monitored by whom, what reactions must be triggered for certain events and with which reaction times, and how to handle the log data. The security template files supplied with Windows Server 2003 are located in the %SystemRoot%\Security\Templates folder. They can be viewed with the MMC management console (Security Templates snap-in) and serve to provide an overview and basic orientation.

The users and events to be monitored are specified in the Group Policies snap-in. It should be documented if, and if yes, for what reason, success and/or error events are to be logged for the following categories:

Monitoring objects

To monitor object accesses (e.g. files), it must be ensured that monitoring is activated in the monitoring policy of the server as well as in the properties of the selected objects. For example, Windows Server 2003 allows administrators to assume ownership of files and to transfer ownership to third parties, and therefore also back to the original owner. Windows Server 2003 therefore only has limited capabilities for detecting such actions. For this reason, the logs of the monitored objects should be evaluated regularly for such events.

Event logs

The logs can be viewed and administered manually with the Event Viewer. Every entry has additional details and a unique event ID for which there are detailed descriptions. The Event Viewer configuration must be defined. The following aspects must be taken into account to accomplish this:

Instruments for monitoring logged events

Logs can be evaluated manually (e.g. using the Event Viewer), using user-defined scripts (e.g. Eventlg.pl, Eventquery.vbs), using special tools (e.g. Dumpel.exe, Auditusr.exe, EventCombMT), or using fully automatic management tools (e.g. Microsoft Operations Manager 2005, MOS 2005). Furthermore, there are also products available from third-party manufacturers for this purpose.

Source information:

Tool Source
Eventlg.pl Windows 2000 Resource Kit, Supplement 1
Eventquery.vbs Windows 2000 Resource Kit, Supplement 1
Dumpel.exe Windows 2000 Server Resource Kit, Supplement 1
Auditusr.exe Part of Windows Server 2003 with SP1
EventCombMT Microsoft Windows Server 2003 Resource Kit Tools

These products also cover requirements for monitoring that cannot be adequately realised using the built-in Windows Server 2003 resources. These requirements include, for example, notification via SMTP, near real-time reaction to events, or a forensic analysis approach to detect suspicious incidents and determine the parties responsible.

When monitoring the availability of a Windows Server 2003 or its services, it must be taken into account that reliable monitoring and automatic escalation can only be guaranteed by an independent, third-party system.

The type of monitoring should also be documented in the monitoring policy.

Documentation

The monitoring policy serves as documentation. Furthermore, security templates (.inf files) should be created for the monitoring policy in effect for the Windows Server 2003 system. The objects monitored and the types of events logged by other tools must also be documented.

Review questions: