Posts Tagged ‘auditing’

Webinar: Anatomy of an Insider Threat

February 27, 2015

Here is a link to another blockbuster we did with Randy Franklin Smith.

In this episode we track down a real world security incident that reveals unauthorized access and disclosure of sensitive data residing on a file server. Randy shows how this would be done with native Windows tools. Then I pull the curtain from IT Search, our most recent invention and feature added to Dell InTrust.

Highly recommended for security managers, IT admins, data analysts and anybody who deals with enterprise security firsthand.

 

 

Advertisement

Top 10 Reports for Your Windows Server Environment

February 20, 2015

“Have you hugged your Active Directory today?”

That wouldn’t make much of a bumper sticker I suppose, but you could say that the health and happiness of your Active Directory were top of mind for us when we packed more than 140 reports into Enterprise Reporter. Continue reading here.

Lessons learned from the trench: counting user clicks can protect you from class action lawsuits

February 21, 2013

In my previous post I gave you an example how logon events could become a cornerstone of a real life security investigation. It turns out tracking down employee hired outsourcers breaking into your network  is not the only way this “attribute of every hacker movie” can save organizations a lot of money. Ever thought how logon events could play a vital role in class action lawsuits? Read on.

The second story is never less interesting. A major telecom provider was featured in a case with its call center employees, which felt frustrated with unachievable performance objections and of course underpaid. According to those that filed a class action suite they had to work off the clock to take care of their email and other preparatory tasks before they logged on to the system to answer the calls. Apparently, the company has been employing some kind of time tracking system that compared the employee logon time in the beginning of the day with the time they logged off before they left for the day. Why did this turn out to not be enough?

Well, first of all this is not solely a technology issue. It might start in a way employees approach their job responsibilities, plan their day and even receive instructions from management. I am not going to dive into this aspect of the problem.

What I would find interesting is how this time tracking system accounts for things that happen in between those two official markers of the day: logon and logoff. What happens when employees finish their calls and take time to check email on their smartphones? What happens when they leave for lunch? What happens when they forget to logoff before they leave their workplace for the day? It is not only about logons and logoffs any more but rather about counting “periods of user activity” when employees are actively interfacing with the business application.

As you can see, logon events can find a great use in the situations you never expect up front. Usually, you have to have a technology in place that would remove the pain of managing these events from thousands of systems and make sure that you can get meaningful insight into this data when the time comes.

Need references? Check out Dell InTrust that recently received exciting new features including “superior user logon tracking”. It is superior because it tracks a lot more than native logon and logoff events can do. Not only does it capture the exact duration of each user logon session and factors in events like workstation lock, accidental system shutdown and screensaver activity, but It also lets you build daily and weekly reports showing the total time users were found actively logged on to their desktops.

With this patent pending InTrust technology in place every user check in and check out at her desktop is accounted for. By capturing critical user activity data and storing that in a tamper proof archive you gain critical evidences admissible in the court of law.

This post was originally published here.

Lessons learned from the trench: outsmarting the boss will not outsmart #eventlogs

February 12, 2013

Just like accountants have to keep company invoices organized in files and save them from the sun and moisture, IT admins should take good care of logon events and diligently keep them on a big server in an armored dark room. Who knows when and how they might come in handy.

Storing logon events alone is quite a big deal considering the amount of data you have to cope with. But in this post I want to touch on an even more challenging aspect of this – making sense of logon events, which as it turns out can save you from a lot of trouble.

There was a case study published by the Verizon security team that was called on site of one unnamed critical infrastructure company in the US to conduct an investigation of very strange VPN server activity originating from China. As it turned out it was an unnamed employee referred to as ”Bob” who was lazy enough to outsource his work from his office in the US to someone in China and not smart enough to do it in a very straightforward way – ship his RSA token so that outsources could get access to the company’s network on Bob’s behalf.

Giving Bob a credit, his business model has been undetected for several years. The guy is described as “Mid-40s software developer versed in C, C++, Perl, Java, Ruby, PHP, Python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator”.  So while he was watching cat videos on Reddit in his earned spare time developers in China were checking in the code of an internal application. We can only guess how much review that code received from Bob and how much room was left for introducing malicious code that could have been exploited.

But how did the company not detect for so long this side business of Bob that might have put it at great risk of security exposure?  And how could it have been detected? Logon events are a key. Obviously, Bob was logging to the same corporate network as guys in China he paid to do the job. Obviously, those two events happened to coincide in time more than once. Would not two logon events coming for the same employee ID from different IPs at the same time have looked suspicious to an IT admin had he received report at least once a week? It surely would!  And after reading those reports he’d be one step to tracing down where exactly those logon events were coming from – just take a closer look into the VPN logs.

You might wonder if there is a technology you can rely on to bring similar incidents to your attention and possibly prevent them from happening. Web search results will promptly suggest a battery of SIEM vendors that boast automatic security incident detection and resolution. Although it might pay off for most common patterns of attacker’s behavior, incidents like this one would usually go unnoticed by SIEM. The only practical way to battle those today is to put the right forensics analysis tools in the hands of a human being and let the combination of technology and human brain find the needle in a haystack.

Dell InTrust is a perfect example of such technology. Unlike traditional SIEM solutions it zeroes in on interactive analysis of diverse event data, capturing all aspects of user activity. Thanks to its revolutionary event compression and indexing you can easily sift through billions of event records in a matter of seconds. What is more important is that you won’t have to seek advice of event log experts every time you encounter an unfamiliar event. InTrust and its integration with Dell ChangeAuditor lets you speak the simplified event log language: who did what, when, where and from what workstation.

This is just one of the examples that shows how strong forensic analysis and rich event data specifically around logon activity can save companies a lot of money and even protect its IP. In my next blog post I’ll continue on this topic and share another lesson we learned from the trench.

The post was originally published here.

 

OnDemand Log Management: Now supporting syslog, agent less collection and more

August 25, 2011

OnDemand Log Management gets exciting new features that help you comply with IT regulations, stay on top of changes to critical IT resources and detect and react to security issues. Continue here.

Stay on top of security issues with OnDemand Log Management

January 27, 2011

You tell me how important it is to keep a close eye on the Holy Grail of most IT environments today – Microsoft Active Directory.  No one else can solve this pain for you in a more elegant way than OnDemand Log Management with its extended auditing capability which covers Active Directory and other IT infrastructure components.

In this short video watch how subscription bases OnDemand Log Management lets you:

  1. Easily set up comprehensive tracking of all changes made to Active Directory irregardless of the native auditing configuration
  2. Perform investigation of security issues by giving you tools to effectively search and analyze audit trails
  3. Take proactive measures to prevent security incidents from happening in the future
  4. Prepare evidence reports suitable for presenting to CSOs and external auditors


Want to conduct your own investigation now?

Sign up for a full functional trial and let us know how it goes.

Alexey