IT tutorials
 
Technology
 

Enabling Security Auditing on Windows Home Server (part 2) - Understanding the Auditing Policies

9/15/2013 7:28:39 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

2. Understanding the Auditing Policies

To help you decide which auditing policies to use, the next few sections give you a bit of detail about some of them. Note that several of these policies require AD to return meaningful or useful results. This means they don’t apply to Windows Home Server, so I don’t discuss them here.

Audit Account Logon Events

The Audit Account Logon Events policy enables you to track when users log on to their account on the Windows Home Server computer. If you track failures for this policy, the resulting Failure Audit event returns an Error Code value, as shown in Figure 2. Table 1 tells you what the various error codes mean.

Figure 2. An example of a failed Account Logon event.

Table 1. Error Codes Returned for Account Logon Failure Events
Error CodeDescription
0xC0000064The user tried to log on with a misspelled or invalid username.
0xC000006AThe user tried to log on with a misspelled or invalid password.
0xC000006DThe user tried to log on with an unknown username or bad password.
0xC000006FThe user tried to log on outside the account’s authorized hours.
0xC0000070The user tried to log on from an unauthorized computer.
0xC0000071The user tried to log on with an expired password.
0xC0000072The user’s account is disabled.
0xC0000193The user’s account is expired.
0xC0000224The user was supposed to change his password at the next logon, but he didn’t.
0xC0000234The user’s account is locked.

Audit Account Management

The Audit Account Management policy enables you to track events related to managing groups and user accounts on Windows Home Server. Events include creating new groups or users, modifying or deleting groups or users, changing user passwords, or renaming or disabling users. Table 2 lists the possible event IDs for the Audit Account Management category.

Table 2. Event ID Values for Account Management Events
Account Management Event IDDescription
4720A user account was created.
4722A user account was enabled.
4723An attempt was made to change an account’s password.
4724An attempt was made to reset an account’s password.
4725A user account was disabled.
4726A user account was deleted.
4727A security-enabled global group was created.
4728A member was added to a security-enabled global group.
4729A member was removed from a security-enabled global group.
4730A security-enabled global group was deleted.
4731A security-enabled local group was created.
4732A member was added to a security-enabled local group.
4733A member was removed from a security-enabled local group.
4734A security-enabled local group was deleted.
4735A security-enabled local group was changed.
4737A security-enabled global group was changed.
4738A user account was changed.
4739Domain Policy was changed.
4740A user account was locked out.
4741A computer account was created.
4742A computer account was changed.
4743A computer account was deleted.
4754A security-enabled universal group was created.
4755A security-enabled universal group was changed.
4756A member was added to a security-enabled universal group.
4757A member was removed from a security-enabled universal group.
4758A security-enabled universal group was deleted.
4765SID History was added to an account.
4766An attempt to add the Security ID (SID) History to an account failed.
4767A user account was unlocked.
4780The Access Control List (ACL) was set on accounts that are members of administrators groups.
4781The name of an account was changed.
4782The password hash for an account was accessed.

Figure 3 shows a sample event that occurred when a user’s account was disabled (event ID 4725).

Figure 3. An example of an Account Management event.

Audit Logon Events

The Audit Logon Events policy enables you to track when users log on to the Windows Home Server network. These events always occur in conjunction with Account Logon events. That is, first Windows Home Server processes the logon to the user’s account on the server; then it processes the logon to the network. Table 3 lists the possible event IDs for the Audit Logon Events category.

Table 3. Event ID Values for Logon Events
Logon Event IDDescription
4624An account was successfully logged on.
4625An account failed to log on.
4634An account was logged off.
4647A user initiated logoff.
4648A logon was attempted using explicit credentials.
4649A replay attack was detected.
4675SIDs were filtered.
4778A session was reconnected to a window station.
4779A session was disconnected from a window station.
4800The workstation was locked.
4801The workstation was unlocked.
4802The screensaver was invoked.
4803The screensaver was dismissed.
5378The requested credentials delegation was disallowed by policy.
5632A request was made to authenticate to a wireless network.
5633A request was made to authenticate to a wired network.

If you’re auditing failures for this category, each Failure Audit event tells you the reason for the failure, as shown in Figure 4.

Figure 4. An example of a failed Logon event.

Audit Policy Change

The Audit Policy Change policy enables you to track when users make changes to group policies. The resulting event shows you what policy was changed and what the new policy setting is. For example, Figure 5 shows an event generated by modifying the auditing policies.

Figure 5. An example of a Policy Change event.

Audit Process Tracking

The Audit Process Tracking policy enables you to track the starting and stopping of processes, including programs. For example, you might want to track when scripts run on the server. Most scripts are handled by wscript.exe, so the program runs each time a script is launched. Figure 6 shows an example event created when a script starts.

Figure 6. An example of an Audit Process Tracking event.

Audit System Events

The Audit System Events policy enables you to track system events such as shutdown and startup, security changes, and system time changes. Figure 7 shows an example event, and Table 4 lists the possible event IDs.

 

Figure 7. An example of a System event.

Table 4. Event ID Values for System Events
System Event IDDescription
4608Windows is starting up.
4609Windows is shutting down.
4616The system time was changed.
4618A monitored security event pattern has occurred.
4621The administrator recovered the system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recorded.
4697A service was installed in the system.
5024The Windows Firewall Service has started successfully.
5025The Windows Firewall Service has been stopped.
5027The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.
5028The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.
5029The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy.
5030The Windows Firewall Service failed to start.
5032Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.
5033The Windows Firewall Driver has started successfully.
5034The Windows Firewall Driver has been stopped.
5035The Windows Firewall Driver failed to start.
5037The Windows Firewall Driver detected a critical runtime error.
6008The previous system shutdown was unexpected.
 
Others
 
- Enabling Security Auditing on Windows Home Server (part 1) - Activating the Auditing Policies
- Microsoft Exchange Server 2010 : Getting Help (part 2) - Learning from the Graphical User Interface
- Microsoft Exchange Server 2010 : Getting Help (part 1) - Help from the Command Line
- Microsoft Exchange Server 2010 : Managing Contacts (part 2)
- Microsoft Exchange Server 2010 : Managing Contacts (part 1) - Creating Mail-Enabled Contacts
- Microsoft Lync Server 2010 : Exchange 2010 and SharePoint 2010 Integration - Exchange 2010 Unified Messaging Architecture
- Microsoft Lync Server 2010 : Exchange 2010 and SharePoint 2010 Integration - Call Answering Rules
- Microsoft Lync Server 2010 : Exchange 2010 Unified Messaging
- BlackBerry Development : Pushing Data to Internal Users - Controlling Access to Push, Locating Internal Push Recipients
- BlackBerry Development : Pushing to a Java Application,The Enterprise Push Process
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us