Questions tagged [audit]

Observing/logging a resource for purposes of: - Adding it to a blacklist of whitelist - Keeping tabs on the security of a system

325 questions
5
votes
4 answers

How do I audit changes made to our servers, routers, etc.?

We have a lot of servers (running Windows and Ubuntu) along with a mix of Cisco and Juniper routers with a side of HP Procurve switches. We have a few sysadmins who like to make changes to configs without telling anyone or documenting it anywhere.…
zippy
  • 1,718
  • 3
  • 21
  • 36
5
votes
5 answers

VMware ESX Auditing

I'm looking to generate an excel spreadsheet with various information about each one of my company's ~140 VMs residing on 7 ESX 3.5 servers - specifically, the VM's: Name Allocated Memory, Processors, Hard Drive Average Memory, Processor…
pezhore
  • 93
  • 6
4
votes
1 answer

Investigate potential breach in Azure App Service

We suspect we have had a data breach, but we are not sure how to investigate it to determine the source of the breach or what data was sent. We have an app service that has been running for a while with steady usage. We noticed that over the last…
react-dev
  • 213
  • 2
  • 5
4
votes
2 answers

Any tips for planning a (self-inflicted) software audit?

How do you check that the software at your site is licensed? Have you come up with any tips to minimize effort?
username
  • 4,755
  • 19
  • 55
  • 78
4
votes
2 answers

MySQL enabling the query log for the root user only

I want to an audit log for a particular user/connection and not the application itself. Anytime a client manually connects to the server with specific credentials, I want the query log, and binary log to be enabled. Is this possible, how would I…
Walter White
4
votes
2 answers

Is there a Windows Event character count limitation?

I'm working on output analysis of the Windows Event ID 5136 ("A directory service object was modified") and more specifically events with "LDAP Display Name = nTSecurityDescriptor" (see following event 5136 capture). In the "value" field, I have a…
4
votes
1 answer

Disable auditing of specific ldap attributes

I'm working on some auditing for PCI-DSS, notably "Audit Directory Service Access". This creates a huge volume of logs, mostly based on a couple specific recurring properties being accessed in the same fashion. I've been able to identify these…
Tim Brigham
  • 15,545
  • 10
  • 75
  • 115
4
votes
2 answers

How to log all commands run on Linux including their arguments (parameters)?

How can I log all commands executed on Linux, including their command-line arguments (parameters)? So, for example, if someone runs: rm -rf /tmp/foo I would see a log entry similar to this: 2016-01-01 18:00:00 user=bob command='rm -rf…
Neil
  • 2,425
  • 8
  • 36
  • 45
4
votes
1 answer

Check whether GRANT EXECUTE TO user or role was applied

In Microsoft SQL Server, I can use GRANT EXECUTE TO to grant execute permission to some user or role. I'm interested in detection: How can I equally simply check whether that GRANT EXECUTE command was already applied to given user/role?…
miroxlav
  • 291
  • 1
  • 3
  • 9
4
votes
0 answers

Why does ausearch skip entries?

I am trying to use the ausearch tool search my auditd logs for specific entries. The problem is that most of the entries in audit.log appear to be unsearchable. Searching with matching parameters often returns , even though there is a…
user339676
  • 171
  • 5
4
votes
1 answer

Audit logs are not being generated on linux machine

Hi We are using four linux servers for on application. Application just simply generates reports using scripts... Now for three servers audit logs are being generated in /var/log/audit directory (as below) but for one server no logs are being…
4
votes
4 answers

How to parse audit.log using logstash

I want to use logstash to collect a log file, and the format of the file was like this: type=USER_START msg=audit(1404170401.294:157): user pid=29228 uid=0 auid=0 ses=7972 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='op=PAM:session_open…
txworking
  • 479
  • 2
  • 6
  • 15
4
votes
1 answer

How can I set audit controls on files owned by TrustedInstaller using Powershell?

I am trying to set audit controls on a number of files (listed in ACLsWin.txt) located in \%Windows%\System32 (for example, aaclient.dll) using the following Powershell script: $FileList = Get-Content ".\ACLsWin.txt" $ACL = New-Object…
Drise
  • 177
  • 2
  • 8
4
votes
1 answer

Survive a Software Audit

I received a letter from Autodesk asking for a "License Assessment". I understand it as a software audit. They plan to do it remotely. The thing is, I'm a freelancer, I don't use any Software Asset Mangment software, and I just recently swap out my…
rosepost1150
4
votes
1 answer

How can I log the creation of Exchange 2003 and 2010 mailboxes?

We are trying to acquire a new certificate/label. In order to get this certificate/label we need to monitor the creation of mailboxes in Microsoft Exchange. We are currently using Microsoft ACS (Audit Collection Services), but if a mailbox is…
Bart De Vos
  • 17,911
  • 6
  • 63
  • 82
1 2
3
21 22