{"id":4418,"date":"2016-02-16T09:40:51","date_gmt":"2016-02-16T15:40:51","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4418"},"modified":"2018-12-18T13:33:58","modified_gmt":"2018-12-18T19:33:58","slug":"best-practices-for-monitoring-windows-logins","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/best-practices-for-monitoring-windows-logins\/","title":{"rendered":"Best Practices for Monitoring Windows Logins"},"content":{"rendered":"<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Enterprise network administrators usually implement some security and access control measures over standard user accounts, but may neglect service accounts, which become vulnerable targets.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">As proof against threats from malicious users inside or outside the enterprise \u2013 and to comply with regulatory authorities \u2013 it\u2019s essential to keep a close eye on what\u2019s happening in your Windows environment by monitoring and auditing user activities over your Windows Server-based network. This guide should help.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">What Windows Lacks<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Of the major operating systems, Windows provides the biggest set of security features. But Netware, UNIX and even the mainframe have the edge, when it comes to basic login session controls. When a Windows user logs on, there isn\u2019t even a display of their previous logon time.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">In the Windows environment, monitoring of logon sessions, reporting of logons and logoffs, and control of concurrent logins are all absent, as is the remote logoff of sessions on workstations.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Group-defined restrictions of workstations and logon times are also missing, as are enforceable logoffs when allocated logon times have expired.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Depending on your audit settings, the information recorded by Windows may be dense, cryptic, and poorly documented.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Success or Failure?<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_login.png\" rel=\"attachment wp-att-4421\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4421 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_login.png\" alt=\"microsoftlogin_login\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_login.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_login-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_login-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><a href=\"http:\/\/www.gfi.com\/blog\/monitoring-logons-in-windows-environments\/\" target=\"_blank\" rel=\"nofollow\">Monitoring logon events <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>is useful not only for failed attempts to gain access, which may indicate malicious attempts to infiltrate your system.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Logon attempts which succeed can yield valuable information too \u2013 and can help ensure the continued health of your network infrastructure.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Knowing Who\u2019s Who<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Monitoring successful logon attempts provides information on the activities of your users, both in a business productivity sense, and from a security perspective.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Potentially abnormal events like a single user simultaneously requesting access to multiple resources, or users logging on outside normal working hours may be a red flag for suspicious activity worthy of further investigation.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Even the activities of privileged users like system administrators need to be monitored from a security standpoint, and for regulatory compliance.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">A <a href=\"http:\/\/www.isdecisions.com\/blog\/it-security\/monitor-user-activity-on-windows-server-network\/\" target=\"_blank\" rel=\"nofollow\">log management tool <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>configured to collect user information according to rules and time frameworks that you establish beforehand can categorise user activity and manage logon events. The software should be capable of identifying privileged administrative users, and categorising their activities, accordingly.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Since user names in Windows don\u2019t indicate group affiliations and may be time-dependent, it\u2019s essential to use a log management tool capable of establishing a user\u2019s privileges at the time that an event caused by their activities was logged.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">The Price of Failure<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Mistyped passwords and unauthorised attempts to gain access to computers and network resources are at the opposite ends of the scale, when it comes to failed logons. Failed logons to a print server may indicate that your printer hardware or software is down. But there\u2019s more to it, than that.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">With service accounts \u2013 especially with services that don\u2019t belong to authorised applications \u2013 failed logons may be an indication of malware.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">When a service is authorised, or forms a part of your network infrastructure, failed service account logons may point to downtime issues.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_password.png\" rel=\"attachment wp-att-4422\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4422 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_password.png\" alt=\"microsoftlogin_password\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_password.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_password-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_password-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">If computer accounts fail to log in, there may be underlying issues with network configuration, authentication protocols or IPSec policies. All have the potential to disrupt your operations.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Automated brute force attacks may be the real cause behind a large number of failed logon attempts recorded in a short time period. If your account lockout protocols aren\u2019t strong enough, this could have dire consequences.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Setting Your Audit Policy<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Your <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/dn487458.aspx\" target=\"_blank\" rel=\"nofollow\">Windows audit policy <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>establishes the type and number of events that are to be monitored and logged. So you\u2019ll need to establish which configuration will best give all the information you\u2019re looking for.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">The Audit account logon events policy instructs your system to record security events each time a user account\u2019s logon or logoff is validated on different machines where this policy has been configured. Audit account logon events is best used to monitor the activities of users on a particular machine.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">The Audit logon events policy records data in the Logon\/Logoff category of any machine on which you wish to monitor access, logging security events each time a user logs onto the machine.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Monitoring Workgroups<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Each computer in a Windows workgroup acts as a standalone machine, with its local security database taking precedence. NTLM authentication is typically used, so logon events need only be monitored on that local machine. These are stored in the machine\u2019s security log.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">For logon activity monitoring in Windows workgroups, you should enable the Audit logon events category on each machine in the workgroup, monitoring their security logs for events that fall in this category.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Monitoring Domains<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_security.png\" rel=\"attachment wp-att-4423\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4423 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_security.png\" alt=\"microsoftlogin_security\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_security.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_security-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/02\/microsoftlogin_security-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">In a Windows domain, a security database resides at the domain level on your Domain Controller(s), providing a hierarchy which centrally manages all the machines.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Domain user accounts may be given access to machines within the domain, automatically becoming members of accounts local to users on the domain\u2019s machines.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Kerberos is used to authenticate Windows domains, and service tickets and authentication tickets may be required to validate a user (and the machine the user connects from) to the Domain Controller.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">You may need to monitor the Domain Controller security log to establish the activities of domain user accounts \u2013 including the local logons of the Domain Controller, itself. Events should be recorded in the Account logon category.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">For events in the Logon\/Logoff category, the member machine security log should be monitored, to follow the activities of user accounts local to the member machine. Local accounts that don\u2019t map to a domain account should be watched closely.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Monitoring Strategically<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><\/h2>\n<p><\/p><dir><span style=\"font-family: verdana,geneva,sans-serif;\">Set your security control criteria, and restrictions such as those based on time, location, or prohibiting concurrent sessions.<\/span><\/dir>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Monitor and log all login and session events across terminals, workstations, Internet Information Services (IIS), Wi-Fi and VPN.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Be able to determine who\u2019s connected, which system they\u2019re using, when they connect, and how long for.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Be prepared to generate reports \u2013 both to give an overview of your users\u2019 activity, and drilling down to particular time-frames.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 Enterprise network administrators usually implement some security and access control measures over standard user accounts, but may neglect service accounts, which become vulnerable targets. \u00a0 As proof against threats from malicious users inside or outside the enterprise \u2013 and to comply with regulatory authorities \u2013 it\u2019s essential to keep a close eye on what\u2019s [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4421,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,8],"tags":[],"class_list":["post-4418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4418"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4418\/revisions"}],"predecessor-version":[{"id":6121,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4418\/revisions\/6121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4421"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}