21.3 Configuring Auditing

The configuration of auditing, with the SecureLogin Collector, differs for workstations in Active Directory environments and non-Active Directory environments. The configuration involves enabling audit for the target system and configuration of the appropriate accounts to access the Windows Event Logs remotely by Sentinel. For more information, see the WMS Connector (Sentinel Connector and Collector).

21.3.1 Monitoring a System in a Domain Environment

In a domain environment, a domain account must be created that has the policy rights to access the Windows Security Event logs on the remote Event Sources. This domain user account must be recognized by the Event Sources either as a user within the domain, or a user within one of the groups referenced on the server.

Configuring Events Logged by Windows Event Log

Use the following procedure to enable basic Windows event logging for use with Windows Collectors. To collect data from a different application that writes to the Windows Event Log, refer to the documentation for the associated Collector. See the Sentinel Connector and Collector website.

To configure the Sensor to report Events to Security Log:

  1. Log on to Windows with an account that has Administrative rights.

  2. Click Start > Settings > Control Panel.

  3. In Control Panel window, double-click Administrative Tools.

  4. Double-click Local Security Policy; expand Local Policies, then double-click Audit Policy.

  5. Double-click a specific audit policy to edit the security settings.

  6. In Local Security Setting window, select Success/Failure.

  7. Click OK.

Configuring Users to Collect Windows Event Log Remotely

  1. From the Event Source, click Start > Settings > Control Panel.

  2. In the Control Panel window, select Administrative Tools > Local Security Policy > Local Policies > User Rights Assignment > Manage auditing and security log.

  3. Click Add.

  4. In Select Users/Groups, click Look in field and select the domain with the account to be used for collecting the security event log information.

  5. Double-click the account to be used, then click OK.

  6. In the Local Security Policy Settings window, click OK.

    The new policy setting takes effect after you restart the system.

    NOTE:If domain-level policy settings are defined, they override local policy settings.

Setting up the Windows Management Instrumentation Service

  1. Log in to the remote computer and click Start > Settings > Control Panel.

  2. In the Control Panel window, double-click Administrative Tools > Computer Management.

  3. In the Computer Management window, on the Tree tab expand Services and Applications; right-click WMI Control, then select Properties.

  4. In WMI Control Properties window, select the Security tab.

  5. Select the Root folder, then click Security to open the Security for Root dialog.

    If the User or Group that needs the remote WMI access does not appear in the list, click Add.

  6. From the Select Users, Computers, or Groups window, select the user or group that needs remote WMI access, then click Add.

  7. After you finish selecting users or groups, click OK.

  8. Select the newly added user or group and ensure that they have at least the following permissions depending on what type of Event log you want to access:

    • Execute Methods

    • Provider Write

    • Enable Account

    • Remote Enable

  9. With the user or group still highlighted, click Advanced.

  10. Select the group, then click View/Edit, to open the Permission Entry for Root dialog.

  11. From the Apply onto list, select This namespace and sub namespaces.

  12. Click OK on each dialog until you return to the Computer Management window.

  13. Restart the WMI service. See Starting and Stopping the WMI Service.

Configuring Domain Account User COM/DCOM

The procedure to configure domain account user COM/DCOM differs based on the platform on the SecureLogin workstation. See the WMS Connector document (Sentinel Connector and Collector).

21.3.2 Monitoring a System in a Non-Domain Environment

In a non-domain environment, local accounts must be created on both the Collector Manager system and on the Event Source. These accounts must have the same username and password.

Configuring Events Logged by Windows Event Log

See Configuring Events Logged by Windows Event Log.

Configuring Users to Collect Windows Event Log Remotely

In a non-Active Directory environment, you must create a user account on each event source, that is, each workstation running SecureLogin. This same username and password must be configured on the Collector Manager machine. On Collector Manager machine, this user must be part of Administrator group. See Configuring Users to Collect Windows Event Log Remotely.

Setting up the Windows Management Instrumentation Service

See Setting up the Windows Management Instrumentation Service.

Configuring Domain Account User COM/DCOM

See Configuring Domain Account User COM/DCOM.