S 4.148 Monitoring a Windows 2000/XP system

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, Auditor

The monitoring of computer systems is an important means of maintaining system security and system integrity. This is the only way to detect possible security gaps, violations against the currently valid security policies, or even attacks by insiders and outsiders, and trigger suitable countermeasures.

The monitoring (or auditing) of a Windows 2000/XP system must be taken into account in the planning phase so that the relevant parameters can be specified according to the requirements. In order to monitor a Windows 2000/XP system, monitoring must first be enabled in general. This applies especially to file and registry monitoring. The enabling and configuration of the monitoring components is performed using the following group policy parameters:

General enabling of the "auditing" functions:

In each case, the values No auditing or Success and/or Failed can be set.

Computer Policies / Local Policies / Audit Policies  
Parameter Recommendation
Audit process tracking Process tracking is generally unreasonable and should only be enabled for debugging purposes.
Audit use of rights The use of user rights should be monitored.
Audit policy change Changes to policy settings (GPOs) are operations that are critical to security and should be monitored.
Audit system events Enables logging of boot events.
Audit logon events Logging of logon events should be enabled on the local computer (e.g. the workplace computer).
Audit logon attempts Logging of logon attempts on the domain controller which conducts user authentication should be enabled.
Audit account management Changes to account settings are events that are critical to security and should be monitored.
Audit object access This option should be activated, because it makes logging of file and registry access possible.
Audit Active Directory access This is only relevant on domain controllers. Changes to the AD should be monitored.

Table: Computer, local and audit policies

Settings for the log files:

1. Computer Policies / Local Policies / User Rights Assignment  
Parameter Recommendation
Manage auditing and security log This right allows the following:
  • configuration of the audit settings for individual objects (files, registry, Active Directory),
  • viewing and deleting the security log.
Which user group (or groups) should be granted this right depends on the monitoring concept. As a matter of principle, this right should only be assigned restrictively. However, the following should be taken into account in this case:
  • It may also be necessary to access the security log for diagnostic purposes and to eliminate problems not related to security.
  • Administrators can re-grant themselves this user right even if it has been revoked. It is therefore recommended to log this process (Audit privilege use option).
2. Computer Policies / Local Policies / Event Log  
  • Retention method for application log
  • Retention method for security log
  • Retention method for system log
You can select between the following options depending on the logging concept:After ... Days,Overwrite andDo not overwrite.
  • Retain application log for
  • Retain security log for
  • Retain system log for
Number of days where the After ... Days retention method has been chosen.
Windows 2000:
  • Restrict Guest account group access to application log
  • Restrict Guest account group access to security log
  • Restrict Guest account group access to system log
Windows XP:
  • Prevent local Guest account group from accessing application log
  • Prevent local Guest account group from accessing security log
  • Prevent local Guest account group from accessing system log
The access restrictions for the Guest account should be enabled.
  • Maximum size of application log
  • Maximum size of security log
  • Maximum size of system log
The size must be selected so that enough storage space is available for the storage method used even during times of above-average system activity.This is especially important for the security log because otherwise a gap in time can arise while monitoring the security of the system.Suggestions for the settings to be specified here can be found in S 2.231 Planning the group policy under Windows and S 4.244 Secure configuration of Windows client operating systems. However, the suggested settings must be adapted to the real conditions (and tested in test operations).
Windows 2000:Shut down system when max. security log size has been reached In normal operation, this should be handled with caution. However, this option is useful in high-security areas where a complete audit trail is more important than availability. In any case, using this option must be examined carefully.

Table: Settings for the log files

In general, the following aspects also must be taken into account in the context of auditing:

In the scope of the system function monitoring, it is also recommended to regularly check the AD replication process through which configuration changes are propagated. AD tools such as repadmin.exe or showreps.exe can be used for this purpose. The ADS (Active Directory Service) log and the FRS (File Replication Service) log should also be checked for error messages. An error during replication usually means that the configuration changes were not made everywhere. This means there is a danger that there may be users who have been granted unsuitable rights or too many rights.

The system time plays an important role when monitoring the system and evaluating the log data. When monitoring several systems it is especially important to synchronise the system time on all computers. Windows 2000 introduced the W32Time Time Service (Windows time source). This service is responsible for synchronising time.

In an Active Directory environment, the authorising domain controller is the time source for the domain members. The Windows Time Service has a hierarchical structure: The domain controller of the root domain that has the PDCE FSMO role becomes the central time source for the entire Active Directory infrastructure. The domain controller can be configured with the net time /setsntp:<time source> command in such a manner that it uses an external time source for synchronisation. The time source can be located inside or outside of the organisation's network, although the use of an internal time source should be preferred. If a time source outside of the organisation's own network is used, then its trustworthiness must be ensured.

Client computers that are not members of a domain use the Microsoft Time Server time.windows.com by default. However, they can also be configured to use a different time source with the net time command or via the (HKEY_LOCAL_MACHINE\ SOFTWARE\Microsoft\Windows\CurrentVersion\DateTime\Servers) registry.

Review questions: