IT tutorials
 
Technology
 

Active Directory 2008 : Improving the Security of Authentication in an AD DS Domain - Auditing Authentication

9/4/2013 9:18:20 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Account Logon and Logon Events

This lesson examines two specific policy settings: Audit Account Logon Events and Audit Logon Events. It is important that you understand the difference between these two similarly named policy settings.

When a user logs on to any computer in the domain using a domain user account, a domain controller authenticates the attempt to log on to the domain account. This generates an account logon event on the domain controller.

The computer to which the user logs on—for example, the user’s laptop—generates a logon event. The computer did not authenticate the user against his or her account—it passed the account to a domain controller for validation. The computer did, however, allow the user to log on interactively to the computer. Therefore, the event is a logon event.

When the user connects to a folder on a server in the domain, that server authorizes the user for a type of logon called a network logon. Again, the server does not authenticate the user—it relies on the ticket given to the user by the domain controller. However, the connection by the user generates a logon event on the server.

Tip

Be certain that you can distinguish between account logon events and logon events. The simplest way to remember the difference is that an account logon event occurs where the account lives: on the domain controller that authenticates the user. A logon event occurs on the computer to which the user logs on interactively. It also occurs on the file server to which the user connects using a network logon.

Configuring Authentication-Related Audit Policies

Account logon and logon events can be audited by Windows Server 2008 R2. The settings that manage auditing are located in a GPO in the Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy node. The Audit Policy node and the two settings detailed in the previous section are shown in Figure 1.

Authentication-related policy settings

Figure 1. Authentication-related policy settings

To configure an audit policy, double-click the policy, and its properties dialog box appears. The Audit Account Logon Events Properties dialog box is shown in Figure 2.

The Audit Account Logon Events Properties dialog box

Figure 2. The Audit Account Logon Events Properties dialog box

The policy setting can be configured to one of the following four states:

  • Not defined If the Define These Policy Settings check box is cleared, the policy setting is not defined. In this case, the server audits events based on its default settings or on the settings specified in another GPO.

  • Defined for no auditing If the Define These Policy Settings check box is selected, but the Success and Failure check boxes are cleared, the server will not audit these events.

  • Audit successful events If the Define These Policy Settings check box is selected, and the Success check box is selected, the server will log successful events in its Security log.

  • Audit failed events If the Define These Policy Settings check box is selected, and the Failure check box is selected, the server will log unsuccessful events in its Security log.

A server’s audit behavior is determined by the settings that are applied as the resultant set of policy. In Windows Server 2008 R2, the default setting is to audit successful account logon events and successful logon events. So both types of events are, if successful, entered in the server’s Security log. If you want to audit failures or turn off auditing, you must define the appropriate setting in the audit policy.

Scoping Audit Policies

As with all policy settings, you should scope settings so that they affect the correct systems. For example, if you want to audit attempts by users to connect to remote desktop servers in your enterprise, you can configure logon event auditing in a GPO linked to the OU that contains your remote desktop servers. If, on the other hand, you want to audit logons by users to desktops in your human resources department, you can configure logon event auditing in a GPO linked to the OU containing human resources computer objects. Remember that domain users logging on to a client computer or connecting to a server will generate a logon event—not an account logon event—on that system.

Only domain controllers generate account logon events for domain users. Remember that an account logon event occurs on the domain controller that authenticates a domain user, regardless of where that user logs on. If you want to audit logons to domain accounts, you should scope account logon event auditing to affect only domain controllers. In fact, the Default Domain Controllers GPO that is created when you install your first domain controller is an ideal GPO in which to configure account logon audit policies.

Viewing Logon Events

Account logon and logon events, if audited, appear in the Security log of the system that generated the event. Figure 3 shows an example. So if you are auditing logons to computers in the human resources department, the events are entered in each computer’s Security log. Similarly, if you are auditing unsuccessful account logons to identify potential intrusion attempts, the events are entered in each domain controller’s Security log. This means, by default, that you will need to examine the Security logs of all domain controllers to get a complete picture of account logon events in your domain.

Authentication events in the Security log

Figure 3. Authentication events in the Security log

As you can imagine, in a complex environment with multiple domain controllers and many users, auditing account logons or logons can generate a tremendous number of events. If there are too many events, it can be difficult to identify problematic events worthy of closer investigation. You should balance the amount of logging you perform with the security requirements of your business and the resources you have available to analyze logged events.

Practice Auditing Authentication

Practice Auditing Authentication

In this practice, you use Group Policy to enable auditing of logon activity by users in the contoso.com domain. You then generate logon events and view the resulting entries in the event logs.

EXERCISE 1 Configure Auditing of Account Logon Events

In this exercise, you modify the Default Domain Controllers Policy GPO to implement auditing of both successful and failed logons by users in the domain.

  1. Open Group Policy Management from the Administrative Tools program group.

  2. Expand Forest, Domains, Contoso.com, and Domain Controllers.

  3. Right-click Default Domain Controllers Policy and choose Edit.

    Group Policy Management Editor appears.

  4. Expand Computer Configuration, Policies, Windows Settings, Security Settings, and Local Policies, and then click Audit Policy.

  5. Double-click Audit Account Logon Events.

  6. Select the Define These Policy Settings check box.

  7. Select both the Success and Failure check boxes. Click OK.

  8. Double-click Audit Logon Events.

  9. Select the Define These Policy Settings check box.

  10. Select both the Success and Failure check boxes. Click OK.

  11. Close Group Policy Management Editor.

  12. Open Command Prompt and type gpupdate.exe /force.

    This command causes SERVER01 to update its policies, at which time the new auditing settings take effect.

EXERCISE 2 Generate Account Logon Events

In this exercise, you generate account logon events by logging on with both incorrect and correct passwords.

  1. Log off of SERVER01.

  2. Attempt to log on as Administrator with an incorrect password. Repeat this step once or twice.

  3. Log on to SERVER01 with the correct password.

EXERCISE 3 Examine Account Logon Events

In this exercise, you view the events generated by the logon activities in Exercise 2.

  1. Open Event Viewer from the Administrative Tools program group.

  2. Expand Windows Logs, and then click Security.

  3. Identify the failed and successful events.

 
Others
 
- Microsoft Lync Server 2010 : Enterprise Voice - Remote Site Survivability
- Microsoft Lync Server 2010 : Enterprise Voice - Enhanced 911
- Microsoft Lync Server 2010 : Enterprise Voice - Media Bypass
- Exchange Server 2010 : Object-Oriented Use of PowerShell (part 2) - Formatting Output, Directing Output to Other Cmdlets
- Exchange Server 2010 : Object-Oriented Use of PowerShell (part 1) - Filtering Output
- Exchange Server 2010 : Introduction to PowerShell and the Exchange Management Shell - Understanding the Command Syntax
- Windows 8 : Controlling Access to Files and Folders with NTFS Permissions (part 5) - Determining the Effective Permissions and Troubleshooting
- Windows 8 : Controlling Access to Files and Folders with NTFS Permissions (part 4) - Applying Permissions Through Inheritance
- Windows 8 : Controlling Access to Files and Folders with NTFS Permissions (part 3) - Assigning Claims-Based Permissions, File Ownership and Permission Assignment
- Windows 8 : Controlling Access to Files and Folders with NTFS Permissions (part 2) - Assigning Special Permissions
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us