Implement Threat Detection Solutions Flashcards
Audit Policies ATA OMS
What tool can be used to give recommendations on which audit policies should/could be implemented?
Security Compliance Manager
What is the default auditing policy for Windows 7/8/10?
- Audit Credential Validation: Both Off
- Audit User Account Management: Success
- Audit Account Lockout: Success
- Audit Logoff: Success
- Audit Logon: Success and Failure
- Audit Network Policy Server: Success and Failure
- Audit Special Logon: Success
- Audit Audit Policy Change: Success
- Audit Authentication Policy Change: Success
- Audit Other System Events: Success and Failures
- Audit Security State Change: Success
- Audit System Integrity: Success and Failure
What is the default audit policy for Windows Server 2008/R2/2012/R2/2016?
- Audit Credential Validation: Both Off
- Audit User Account Management: Success
- Audit User Account Lockout: Success
- Audit Logoff: Success
- Audit Logon: Success and Failures
- Audit Network Policy Server: Success and Failures
- Audit Special Logon: Success
- Audit Audit Policy Change: Success
- Audit Authentication Policy Change: Success
- Audit Other System Events: Success and Failures
- Audit Security State Change: Success
- Audit System Integrity: Success and Failure
Why should workstations be monitored in addition Servers being monitored?
Workstations are often the earliest source of detection and the origin of the attack
What types of events should be monitored and alerted?
- Event which any occurrence indicates unauthorized activity
- Accumulations of events that are above the expected baseline.
What event is generated when a privileged user logs onto a system?
Audit Special Logon event 4964
What are some common occurrences of single instance alerts (events whose issuance indicates a likely attack)?
- If two servers that should never connect, connect.
- In a normal user account is added to a sensitive group
- If an account who never logs in after hours, logs in after hours.
- If a new service is installed on a DC
- Regular events where a user is attempting to login to a server they shouldn’t
- If a DA is empty and someone adds themselves to DA
What would be an indicator of a password guessing attack?
A large number of failed logons
What are some items that should be monitored in AD?
- Monitor AV disabling and removal. AV should have an auto restart option
- Monitor Admin accounts for unauthorized changes to things like CN, Name, SamAccountName, UPN, and UAC settings
- Monitor admin activities (removing an account)
- Membership changes for privileged groups. (adminFlags groups)
- Activation and use of the Bultin Administrator Account.
What workflow would help identify which servers should be monitored the most?
Group servers by classification of their workloads.
What Powershell cmdlet can be used to view System Access Control Lists (SACLs)?
Get-ACL
What Powershell cmlet can be used to modify SACLs?
Set-ACl
What different types of ACLs are used in Windows?
Discretionary Access Control Lists (DACLs) control access to an object.
System Access Control Lists (SACLs) enables logging on objects.
How can you extend the gpo-based audit policies to include specifics about files, folder,s and even AD objects?
Define auditing for the file, folder, or AD object via SACLs (Auditing Tab of the object’s properties)
Where are Advanced Audit Policies configured?
GPO: Computer Configuration \ Policies \ Windows Settings \ Security Settings \ Advanced Audit Policy Configuration
Which section of the advanced audit policies monitors attempts to authenticate with a DC or the SAM?
Account Logon
How are Account Logon Events different that Logon/Logoff events?
Logon and Logoff are interested in attempts to access a particular system. Account Logon is interested in the account database that was used.
What different subcategories are available for Account Logon Auditing?
Audit Credential Validation
Audit Kerberos Authentication Service
Audit Kerberos Service Ticket Operations
Audit Other Logon/Logoff Events
Which section of advanced audit policies has to do with changes to users, computers, or groups?
Account Management
Which different subcategories exist for Account Management Auditing?
Audit Application Group Management Audit Computer Account Management Audit Distribution Group Management Audit Other Account Management Events Audit Security Group Management Audit User Account Management
Which section of advanced audit policies handles monitoring activities of individual applications and users on a system and how that system is being used?
Detailed Tracking
What are the different subcategories of Detailed Tracking auditing?
Audit DPAPI Activity Audit PNP Activity Audit Process Creation Audit Process Termination Audit RPC Events
On which systems will the DS Access events be written?
Domain Controllers
Which section of advanced audit policies is used to track attempts to logon to a system and tracks user activity?
Logon / Logoff
Which advanced audit policy category would show password spraying or similar attacks?
Logon / Logoff
What are the different subcategories of Logon/Logoff Auditing?
Audit Account Lockout Audit User/Device Claims Audit IPSec Extended Mode Audit Group Membership Audit IPSec Main Mode Audit IPSec Quick Mode Audit Logon Audit Logoff Audit Network Policy Server Audit Other Logon/Logoff Events Audit Special Logon
Which section of advanced audit policies audits events that help track access to specific objects or object types, such as file access, registry key access, etc.?
Object Access
What are the different subcategories of Object Access?
Audit Application Generated Audit Certificate Services Audit Detailed File Share Audit File System Audit Filtering Platform Connection Audit Filtering Platform Packet Drop Audit Handle Manipulation Audit Kernel Object Audit Other Object Access Events Audit Registry Audit Removable Storage Audit SAM Audit Central Access Policy Staging
Which section of advanced audit policies would alert in regards to changes to security policies?
Policy Change
What are the different subcategories of the Policy Change Audit Policy?
Audit Audit Policy Change Audit Authentication Policy Change Audit Authorization Policy Change Audit Filtering Platform Policy Change Audit MPSSVC Rule-Level Policy Change Audit Other Policy Change Events
Which section of advanced audit policies shows when administrators use their permissions?
Audit Non-Sensitive Privilege Use
Audit Sensitive Privilege Use
Audit Other Privilege Use Events
Which audit policy category is responsible for auditing events related to system-level changes on a system that are not covered by other audit categories?
System
What are the different subcategories for the System audit policy?
Audit IPSec Driver Audit Other System Events Audit Security State Change Audit Security System Extension Audit System Integrity
What is Global Object Access Auditing?
Global Object Access Auditing allows administrators to define computer SACLs per object type for files and the registry.
This can be used to prove to auditors that every object in a system is protected by an audit policy.
What are the different subcategories of Global Object Access Auditing?
File System (Global Object Access Auditing) Registry (Global Object Access Auditing)
Which audit category captures events generated by the OS on credentials that are submitted for a user account authentication request?
Audit Credential Validation
What is the recommended configuration for “Audit Credential Validation” on all servers?
Audit Success and Audit Failure turned on
What does event ID 4776 indicate in the security log?
The computer attempted to validate credentials for an account.
- This is generated every time a credential validation occurs via NTLM
- For domain systems, this will appear on domain controllers
- This event shows successful and unsuccessful attempts
See Event 4624 on the local system for more details.
What event log entry may indicate a mismatched LAN Manager Authentication?
Event ID 4776 with error code 0xC000006D