{"id":1535,"date":"2014-02-06T08:50:39","date_gmt":"2014-02-06T14:50:39","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1535"},"modified":"2015-04-24T16:42:15","modified_gmt":"2015-04-24T21:42:15","slug":"auditing-windows-server-2012","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/auditing-windows-server-2012\/","title":{"rendered":"Auditing Windows Server 2012"},"content":{"rendered":"<p>\n\t<span style=\"font-size:16px;\">Current business modeling relies heavily on the virtualization of its network. Many transactions and interactions are now carried out by employees and contractors using mobile devices. Doctors and nurses are no longer relying solely on paper-based note recording and filing, making full use of tablets and laptops to handle patient information. Trade, salespeople and contractors are now processing payments while on location instead of waiting to invoice, skyrocketing levels of productivity.<\/span>\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/02\/Auditing-Windows-Server-2012-resized.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Auditing Windows Server 2012\" class=\"alignleft size-full wp-image-1538\" height=\"195\" src=\"\/blog\/wp-content\/uploads\/2014\/02\/Auditing-Windows-Server-2012-resized.jpg\" style=\"margin-right: 20px; margin-top: 8px; margin-bottom: 3px; border: 3px solid black;\" title=\"Auditing Windows Server 2012\" width=\"346\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Auditing-Windows-Server-2012-resized.jpg 1000w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Auditing-Windows-Server-2012-resized-300x168.jpg 300w\" sizes=\"auto, (max-width: 346px) 100vw, 346px\"><\/a><span style=\"font-size:16px;\">All this traffic of sensitive data needs monitoring and appropriate security applied to comply with governance expectations. Leading IT professionals look to Microsoft Windows Server 2012 to assist them with the management of the ever-evolving <a href=\"http:\/\/technet.microsoft.com\/en-us\/magazine\/hh848746.aspx\" rel=\"nofollow\" target=\"_blank\">hybrid IT infrastructure<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. Auditing is an absolute must for your business, offering protection to you, your customers and clients\u2019 interests. If you store patient information and\/or handle credit\/debit card transactions, you must comply with industry specific requirements.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Major retailer Target fell prey to a cybercriminal attack in December. The hackers successfully gathered customer\u2019 credit card details and other personal information at point of sale terminals. It\u2019s no wonder compliance regulations are so stringent. Security firm <a href=\"http:\/\/www.forbes.com\/sites\/anthonykosner\/2014\/01\/17\/researchers-report-exact-timeline-of-massive-target-data-breach\/\" rel=\"nofollow\" target=\"_blank\"> Seculert was able to spot <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> when the malware infection occurred and track its movements. This is a perfect example of how the use of the right auditing tactics was useful in providing transparency.<\/span>\n<\/p>\n<h2>\n\t<span style=\"font-size:16px;\"><strong><u>Auditing Tactics with Windows Server 2012<\/u><\/strong><\/span><br>\n<\/h2>\n<h3>\n\t<span style=\"color:#FF8C00;\"><span style=\"font-size: 16px;\"><strong>Expression based auditing<\/strong> <\/span><\/span><br>\n<\/h3>\n<p>\n\t<span style=\"font-size:16px;\">Windows server 2012 allows you to audit a number of security elements to your server\u2019s infrastructure. Log collection, critical file changes and user-level activity auditing all need to be implemented effectively to get the results your business needs. With Windows Server 2012, you can script the auditing policies you want to focus on, whether expression or resource-based.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Expression-based policies provides filed log results to answer questions such as: \u201cWho is accessing sensitive data?\u201d or \u201cWas there an unauthorized attempt to access restricted data?\u201d Expression based security audit policies log only when specific events occurred outside of the allowed parameters. Recording when an attempt is made to <\/span><a href=\"\/blog\/wp-content\/uploads\/2014\/02\/Protect-Against-Hackers.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Protect Against Hackers\" class=\"size-full wp-image-1537 alignleft\" height=\"169\" src=\"\/blog\/wp-content\/uploads\/2014\/02\/Protect-Against-Hackers.jpg\" style=\"border: 3px solid black; margin-right: 20px; margin-top: 10px; margin-bottom: 10px;\" title=\"Protect Against Hackers\" width=\"224\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Protect-Against-Hackers.jpg 480w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Protect-Against-Hackers-300x225.jpg 300w\" sizes=\"auto, (max-width: 224px) 100vw, 224px\"><\/a><span style=\"font-size:16px;\">access documents by a user working on an unrelated project, or if sensitive data was sought by someone without the appropriate clearance. By auditing just that activity, you only log file results that are relevant.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">The <a href=\"http:\/\/www.newyorker.com\/online\/blogs\/elements\/2014\/01\/the-attack-on-snapchat.html\" rel=\"nofollow\" target=\"_blank\">New Yorker recently reported<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> on how social network Snapchat\u2019s failure to act on an exploitable weakness in their interface, led to research-hackers communicating with the company\u2019s server. Once in, the professional hackers operating as Gibson security were able to harvest large amounts of user data. Considering Gibson had warned the company about this weakness, it is a testament to how failure to comply with the results of an audit \u2013 regardless of how it was achieved \u2013 can result in public shame and loss of customer confidence.<\/span>\n<\/p>\n<h3>\n\t<span style=\"color:#FF8C00;\"><span style=\"font-size: 16px;\"><strong>File access and change auditing<\/strong> <\/span><\/span><br>\n<\/h3>\n<p>\n\t<span style=\"font-size:16px;\">Another security audit you can run with Windows Server 2012 is the monitoring of when critical system files or content is accessed and or altered. <a href=\"http:\/\/www.nytimes.com\/2014\/01\/23\/opinion\/finding-a-needle-in-a-digital-haystack.html?hp&amp;rref=opinion\" rel=\"nofollow\" target=\"_blank\">Tim White<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, global head of government and intelligence for data analytics firm YarcData rightfully stated that: \u201cWinning at cybersecurity today isn\u2019t necessarily about collecting more data. It is about unleashing the information in the data that\u2019s already there.\u201d Such an audit monitors not only who accessed the file, but what the attributes of that file were.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Connecting the dots may unearth a relevant pattern in the type of file that was accessed or altered; one that will be useful when it comes to filtering the attributes upon investigation of a threat. In the event of such a security breach, the server audit will tell you exactly who accessed what file; not just when and where the breach occurred. With that you can assign accountability accordingly.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">The fabric of a modern successful enterprise is a patchwork of remote, on-site and international workers all making use of the same operating system. Windows server 2012 allows administrators to configure the audit policy to monitor those accessing devices with removable storage. The server can create a success audit whenever a successful attempt is made to read or alter files, as well as create failure files for unsuccessful attempts on a removable storage device.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Windows Server 2012 provides a host of flexible auditing features to assist your organization in achieving the level of transparency required to comply with legislation. It protects your company by informing\u00a0 relevant staff when a breach to your security occurs and enabling you to follow its path.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Of course, a layered approach to security is always the best and Windows Server 2012 will never be enough to protect a company by itself. The network should be protected by firewalls (preferably hardware) and antivirus suites, as well as a <a href=\"\/servermonitor?ref=blog\">monitoring system<\/a> that can dig a little bit deeper if something suspicious is flagged.<\/span>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\t<span style=\"color:#A9A9A9;\"><em><span style=\"font-size: 11px;\">Photo Credits:<\/span><\/em><\/span> <em><span style=\"font-size:11px;\"><a href=\"http:\/\/www.apple.com\/\" rel=\"nofollow\" target=\"_blank\"><span style=\"color:#A9A9A9;\">Photo Credit<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"color:#A9A9A9;\">: Apple |\u00a0 Image by <\/span><a href=\"http:\/\/www.flickr.com\/photos\/lanevids\/11454385524\/in\/photostream\/\" rel=\"nofollow\" target=\"_blank\"><span style=\"color:#A9A9A9;\">Lane Fournerat <\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Current business modeling relies heavily on the virtualization of its network. Many transactions and interactions are now carried out by employees and contractors using mobile devices. Doctors and nurses are no longer relying solely on paper-based note recording and filing, making full use of tablets and laptops to handle patient information. Trade, salespeople and contractors [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1538,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,10,9,8],"tags":[],"class_list":["post-1535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-power-admin","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1535"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1535\/revisions"}],"predecessor-version":[{"id":3535,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1535\/revisions\/3535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/1538"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}