netwrix auditor installation configuration guide

104
Netwrix Auditor Installation and Configuration Guide Version: 6.5 10/8/2014

Upload: thanhhai7

Post on 23-Dec-2015

386 views

Category:

Documents


22 download

DESCRIPTION

Giam sat file server va domain controller

TRANSCRIPT

Page 1: Netwrix Auditor Installation Configuration Guide

Netwrix AuditorInstallation andConfiguration GuideVersion: 6.510/8/2014

Page 2: Netwrix Auditor Installation Configuration Guide

Legal Notice

The information in this publication is furnished for information use only, and does not constitute acommitment from Netwrix Corporation of any features or functions, as this publication may describefeatures or functionality not applicable to the product release or version you are using. Netwrix makesno representations or warranties about the Software beyond what is provided in the License Agreement.Netwrix Corporation assumes no responsibility or liability for the accuracy of the information presented,which is subject to change without notice. If you believe there is an error in this publication, please reportit to us in writing.

Netwrix is a registered trademark of Netwrix Corporation. The Netwrix logo and all other Netwrixproduct or service names and slogans are registered trademarks or trademarks of Netwrix Corporation.Active Directory is a trademark of Microsoft Corporation. All other trademarks and registered trademarksare property of their respective owners.

Disclaimers

This document may contain information regarding the use and installation of non-Netwrix products.Please note that this information is provided as a courtesy to assist you. While Netwrix tries to ensurethat this information accurately reflects the information provided by the supplier, please refer to thematerials provided with any non-Netwrix product and contact the supplier for confirmation. NetwrixCorporation assumes no responsibility or liability for incorrect or incomplete information provided aboutnon-Netwrix products.

© 2014 Netwrix Corporation.

All rights reserved.

2/104

Page 3: Netwrix Auditor Installation Configuration Guide

Table of Contents1. Netwrix Auditor Overview 6

2. System Requirements 8

2.1. Requirements for Audited Systems 8

2.2. Requirements to Install Netwrix Auditor 10

2.2.1. Hardware Requirements 10

2.2.2. Software Requirements 10

2.2.3. Deployment Options 11

2.3. Supported Microsoft SQL Server Versions 12

3. Install Netwrix Auditor 14

3.1. Install the Product 14

3.2. Install Netwrix Auditor Agents 15

3.2.1. Install Netwrix Auditor Agent for SharePoint 16

3.2.2. Install Netwrix Auditor Agent to Audit Privileged User Session Activity 16

4. Configure IT Infrastructure for Audit 18

4.1. Configure Domain for Auditing Active Directory 24

4.1.1. Configure Audit Automatically with Active Directory Audit Configuration Wizard 24

4.1.2. Configure Active Directory Domain for Auditing Manually 28

4.1.2.1. Configure Domain Audit Policies 28

4.1.2.2. Configure Security Event Log Size and Retention Settings 29

4.1.2.3. Configure Object-Level Auditing 33

4.1.2.4. Adjust Active Directory Tombstone Lifetime 39

4.2. Configure EMC Storage for Auditing 41

4.2.1. Configure Security Event Log Maximum Size 41

4.2.2. Configure Audit Settings for CIFS File Shares on EMC VNX/ VNXe/ Celerra 41

4.3. Configure Infrastructure for Auditing Event Logs 45

4.3.1. Configure Event Log Auditing on Windows Computers 45

4.3.2. Configure Event Log Auditing on Syslog-Based Platforms 47

4.4. Configure Infrastructure for Auditing Exchange Server 47

3/104

Page 4: Netwrix Auditor Installation Configuration Guide

4.4.1. Configure Exchange Server Administrator Audit Logging Settings 48

4.5. Configure Domain for Auditing Group Policy 49

4.6. Configure Exchange Server for Auditing Mailbox Access 49

4.7. Configure NetApp Filer for Auditing 51

4.7.1. Configure Qtree Security 51

4.7.2. Configure Admin Web Access 52

4.7.3. Configure Event Categories 52

4.7.4. Configure Audit Settings for CIFS File Shares 54

4.8. Configure Computers for Auditing Privileged User Session Activity 55

4.8.1. Configure Data Collection Settings 55

4.8.2. Configure Video Recordings Playback Settings 58

4.9. Configure SharePoint Farm for Auditing 60

4.9.1. Configure Audit Log Trimming 60

4.9.2. Configure Events Auditing Settings 61

4.9.3. Enable Net. Tcp Port Sharing Service 61

4.9.4. Enable SharePoint Administration Service 61

4.10. Configure Windows File Servers for Auditing 61

4.10.1. Configure Object-Level Access Auditing 62

4.10.2. Configure Audit Object Access Policy 65

4.10.3. Configure Advanced Audit Policy 67

4.10.4. Configure Event Log Size and Retention Settings 70

4.10.5. Enable Remote Registry Service 71

4.11. Configure Windows Server for Auditing 72

4.11.1. Enable Remote Registry and Windows Management Instrumentation Services 72

4.11.2. Configure Windows Registry Audit Settings 73

4.11.3. Configure Local Audit Policies 75

4.11.4. Configure Event Log Size and Retention Settings 77

5. Configure Data Processing Account Rights and Permissions 79

5.1. Configure Manage Auditing And Security Log Policy 85

5.2. Define Log On As A Batch Job Policy 85

5.3. Define Log On As A Service Policy 86

4/104

Page 5: Netwrix Auditor Installation Configuration Guide

5.4. Assign Database Owner Role (db_owner) 86

5.5. Assign System Administrator Role 88

5.6. Grant Permissions for AD Deleted Objects Container 89

5.7. Assign Permissions To Registry Key 90

5.8. Add Account to Organization Management Group 90

5.9. Assign Audit Logs Role To Account 91

5.10. Assign Content Manager Role To Account 91

5.11. Assign SharePoint_Shell_Access Role 92

6. Upgrade From Previous Versions 93

7. Uninstall Netwrix Auditor 94

7.1. Uninstall Agents 94

7.2. Uninstall Netwrix Auditor 96

8. Appendix 97

8.1. Install Group Policy Management Console 97

8.2. Install ADSI Edit 98

8.3. Install Microsoft SQL Server 100

8.3.1. Install Microsoft SQL Server 2008 R2 Express or 2012 Express 100

8.3.2. Verify Reporting Services Installation 100

Index 102

5/104

Page 6: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

1. Netwrix Auditor Overview

1. Netwrix Auditor OverviewNetwrix Auditor is a change and configuration auditing platform that streamlines compliance, strengthenssecurity and simplifies root cause analysis across the entire IT infrastructure. It enables complete visibilityby auditing changes made to security, systems and data.

Netwrix Auditor provides complete visibility into IT infrastructure changes with:

l Change auditing: determinewho changed what, when and where.

l Configuration assessment: analyze current and past configurations with the state–in–time reports.

l Predefined reports: pass audits with more than 200 out–of–the–box reports.

Netwrix Auditor employs AuditAssurance™, a patent– pending technology that does not have thedisadvantages of native auditing or SIEM (Security Information and Event Management) solutions that relyon a single source of audit data. The Netwrix Auditor platform utilizes an efficient, enterprise–gradearchitecture that consolidates audit data from multiple independent sources with agentless or lightweight,non–intrusive agent– based modes of operation and scalable two– tiered storage (file– based + SQLdatabase) holding consolidated audit data for 10 years or more.

Powered by the Netwrix AuditAssurance™ technology, Netwrix Auditor makes change auditing an easy andstraightforward process, resulting in a complete and concise picture of all changes taking place in your ITinfrastructure.

The table below provides an overview of each Netwrix Auditor solution:

Solution Features

Netwrix Auditor for ActiveDirectory

Netwrix Auditor for Active Directory detects and reports on all changesmade to the managed Active Directory domain, including AD objects,Group Policy configuration, directory partitions and more. It also makesdaily snapshots of the managed domain's structure that can be used toassess its state at present or at any moment in the past. In addition,Netwrix Auditor for Active Directory provides a built–in Active DirectoryObject Restore tool that allows reverting unwanted changes to ADobjects down to their attribute level.

Netwrix Auditor forExchange

Netwrix Auditor for Exchange detects and reports on all changes madeto Microsoft Exchange Server configuration and permissions. Inaddition, it tracks mailbox access events in the managed Exchangeorganization, and notifies the users whose mailboxes have beenaccessed by non–owners.

Netwrix Auditor for File Netwrix Auditor for File Servers detects and reports Netwrix Auditor on

6/104

Page 7: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

1. Netwrix Auditor Overview

Solution Features

Servers all changes made to Windows– based file servers, EMC storages andNetApp Filer appliances, including modifications of files, folders, sharesand permissions, as well as failed and successful access attempts.

Netwrix Auditor forSharePoint

Netwrix Auditor for SharePoint detects and reports on all changesmade to SharePoint farms, servers and sites, including modifications ofcontent, security settings and permissions.

Netwrix Auditor forSQL Server

Netwrix Auditor for SQL Server detects and reports on all changes toSQL Server configuration and database content.

Netwrix Auditor for VMware Netwrix Auditor for VMware detects and reports on all changes made toESX servers, folders, clusters, resource pools, virtual machines and theirhardware.

Netwrix Auditor for WindowsServer

Netwrix Auditor for Windows Server detects and reports on all changesmade to Windows– based servers' configuration, including hardwaredevices, drivers, software, services, applications, networking settings,registry settings, DNS, and more. It also provides automaticconsolidation and archiving of event logs data. Netwrix Auditor collectsWindows event logs and syslog events from multiple computers acrossthe network, stores them centrally in a compressed format, and enablesconvenient analysis of event log data.

In addition, Netwrix Auditor for Windows Server can be configured tocapture a video of users' sessions on the audited computers whichhelps analyze how changes to your IT infrastructure were made. Videorecords can be integrated into change reports on different auditedsystems.

7/104

Page 8: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

2. System Requirements

2. System RequirementsThis section lists the requirements for the systems and applications that are going to be audited withNetwrix Auditor, and for the computer where the product is going to be installed. It also contains theinformation on the SQL Server versions supported for the product audit database. Refer to the followingsections for detailed information:

l Requirements for Audited Systems

l Requirements to Install Netwrix Auditor

l Supported Microsoft SQL Server Versions

2.1. Requirements for Audited SystemsThe table below provides the requirements for the systems and applications that can be audited withNetwrix Auditor:

Audited System Supported Versions

Active Directory Domain Controller OS versions:

l Windows Server 2003 (any forest mode: mixed/native/2003)

l Windows Server 2008/2008 R2

l Windows Server 2012/2012 R2

Cisco Cisco ASA 5500 Series Adaptive Security Appliance Software Release 8.0

DNS l Desktop OS: Windows XP SP3 (32 and 64-bit) and above

l Server OS: Windows Server 2003 SP2 (32 and 64-bit) and above

NOTE: Netwrix Auditor provides limited support for auditing DNS oncomputers running Windows Server 2012 R2.

EMC Storage EMC VNX/VNXe/Celerra families (CIFS configuration only)

Event logs l Desktop Windows OS: Windows XP SP3 (32 and 64-bit) and above

l Server Windows OS: Windows Server 2003 SP2 (32 and 64-bit) andabove

l Red Hat Enterprise Linux 5

l Ubuntu 11

8/104

Page 9: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

2. System Requirements

Audited System Supported Versions

l Ubuntu Server 11

l Any Linux system using Syslog (event collection rules must be createdmanually)

Exchange Server l Exchange Server 2003

l Exchange Server 2007

l Exchange Server 2010

l Exchange Server 2013

NOTE: Auditing of non– owner mailbox access is not supported forExchange Server 2013 in the current Netwrix Auditor version.

IIS IIS 7.0 (integrated with Windows Server 2008 R2)

NetApp Filer NetApp Filer (CIFS configuration only)

SharePoint l SharePoint Foundation 2010 and SharePoint Server 2010

l SharePoint Foundation 2013 and SharePoint Server 2013

SQL Server l SQL Server 2000

NOTE: Database Content Audit is not supported on SQL Server 2000.

l SQL Server 2005

l SQL Server 2008

l SQL Server 2008 R2

l SQL Server 2012

l SQL Server 2014

VMware l VMware ESXi 4.x and above

l vSphere vCenter 4.x and above

Windows file servers l Desktop OS: Windows XP SP3 (32 and 64-bit) and above

l Server OS: Windows Server 2003 SP2 (32 and 64-bit) and above

Windows Server l Desktop OS: Windows XP SP3 (32 and 64-bit) and above

l Server OS: Windows Server 2003 SP2 (32 and 64-bit) and above

9/104

Page 10: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

2. System Requirements

Audited System Supported Versions

NOTE: Netwrix Auditor provides limited support for auditing serversrunning Windows Server 2012 R2.

2.2. Requirements to Install Netwrix AuditorThis section provides the requirements for the computer where Netwrix Auditor is going to be installed.Refer to the following sections for detailed information:

l Hardware Requirements

l Software Requirements

l Deployment Options

2.2.1. Hardware RequirementsBefore installing Netwrix Auditor, make sure that your hardware meets the following requirements:

HardwareComponent

Minimum Recommended

Processor Intel or AMD 32 bit, 2 GHz Intel Core 2 Duo 2x 64 bit, 3 GHz

RAM 2 GB 8 GB

Disk Space 1 TB

Screen resolution 1024 x 768 Screen resolution recommended by yourscreen manufacturer.

2.2.2. Software RequirementsThe table below lists the minimum software requirements for the Netwrix Auditor installation:

Component Requirements

Operating system l Desktop OS: Windows 7 (32 and 64-bit) and above

l Server OS: Windows Server 2008 R2 and above

Framework l .Net Framework 3.5 SP1

10/104

Page 11: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

2. System Requirements

Component Requirements

AdditionalSoftware

l Internet Explorer 7 and above

l Windows Installer 3.1 and above

l Windows Media Player (only required to audit privileged user sessionactivity)

l Group Policy Management Console (only required to audit Group Policychanges)

Download Remote Server Administration Tools that include GPMC for:

l Windows 7

l Windows 8

l Windows 8.1

For Windows Server 2008/2008 R2/2012/2012 R2, Group PolicyManagement is turned on as a Windows feature.

2.2.3. Deployment OptionsThis section provides recommendations on how best to deploy Netwrix Auditor. Review theserecommendations and choose the most suitable option depending on the IT infrastructure you are goingto audit with Netwrix Auditor.

Install Netwrix Auditor on... To audit...

Any computer in yournetwork

l Cisco

l Event logs

l IIS

l VMware

Any computer in the auditeddomain or domain whereyour audited system resides

l Active Directory*

l DNS*

l EMC Storage

l Exchange Server*

NOTE: If you want to audit Exchange servers located in differentforests for non-owner mailbox access, a separate instanceof Netwrix Auditor must be installed in each forest.

11/104

Page 12: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

2. System Requirements

Install Netwrix Auditor on... To audit...

l Group Policy*

l NetApp Filer

l SharePoint*

NOTE: The computer where Netwrix Auditor is installed must beable to access the Central Administration website on theaudited SharePoint Farm by its name and port number .

Netwrix Auditor Agent for SharePoint must be installedon the computer where SharePoint CentralAdministration is installed.

l SQL Server

l Windows file servers

l Windows Server*

* If you want to audit several domains or systems that reside indifferent domains, you must establish two- way trust relationshipsbetween these domains and the domain where Netwrix Auditor isinstalled.

2.3. Supported Microsoft SQL Server VersionsMicrosoft SQL Server provides the Reporting Services that enable creating reports based on data stored ina SQL Server database. Netwrix Auditor uses Microsoft SQL Server Reporting Services to generate reportson changes to the audited environment and on the point-in-time configuration.

To use the Reports functionality, Microsoft SQL Server must be deployed on the same computer whereNetwrix Auditor is installed, or on a computer that can be accessed by the product.

The following Microsoft SQL Server versions are supported:

Version Edition

SQL Server 2008 Express Edition with Advanced Services

Standard or Enterprise Edition

SQL Server 2008 R2 Express Edition with Advanced Services

Standard or Enterprise Edition

SQL Server 2012 Express Edition with Advanced Services

12/104

Page 13: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

2. System Requirements

Version Edition

Standard or Enterprise Edition

SQL Server 2014 Express Edition with Advanced Services

Standard or Enterprise Edition

The following SQL Server Reporting Services versions are supported: 2008 and above.

NOTE: It is recommended to consider the maximum database size in different SQL Server versions, andmake your choice based on the size of the environment you are going to monitor, the number ofusers and other factors. Note that the maximum database size in SQL Server Express editions maybe insufficient.

Microsoft SQL Server is not included in the product installation package and must be installed manually orautomatically through the Reports Configuration wizard. This wizard automatically installs SQL ServerExpress Edition with Advanced Services and configures the Reporting Services. The SQL Server versioninstalled through the wizard depends on the operating system your computer is running:

SQL Server version OS version

SQL Server 2008 R2 Express Editionwith Advanced Services

l Windows 7

l Windows Server 2008 R2

SQL Server 2012 Express Edition withAdvanced Services

l Windows Server 2008 R2 SP1 and above

l Windows 7 SP1

l Windows 8 and above

l Windows Server 2012 and above

For your convenience, we have provided instructions on the manual installation of Microsoft SQL Serverwith Advanced Services. See Install Microsoft SQL Server for more information. For full installation andconfiguration details, refer to the documentation provided by Microsoft.

NOTE: If you install Netwrix Auditor on a read-only domain controller, SQL Server installation will fail (bothmanual or automatic through theReports Configurationwizard). This is a known issue, for detailsrefer to the following Microsoft Knowledge base article: You may encounter problems wheninstalling SQL Server on a domain controller. To fix the issue, install Netwrix Auditor on anothercomputer, or install SQL Server manually on a different computer that can be accessed by theproduct.

13/104

Page 14: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

3. Install Netwrix Auditor

3. Install Netwrix AuditorThis chapter provides step-by-step instructions on how to install Netwrix Auditor and its agents. Refer tothe following sections for detailed information:

l Install the Product

l Install Netwrix Auditor Agents

3.1. Install the Product

To install Netwrix Auditor

1. Download Netwrix Auditor 6.5.

2. Unpack the installation package. The following window will be displayed on successful operationcompletion:

3. Click Install. Follow the instructions of the setup wizard. When prompted, accept the licenseagreement and specify the installation folder.

14/104

Page 15: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

3. Install Netwrix Auditor

Netwrix Auditor shortcuts will be added to the Start menu/screen and the Netwrix Auditor console willopen.

3.2. Install Netwrix Auditor AgentsFor most audited systems, Netwrix offers both agent-based and agentless data collection methods. Theuse of agents is recommended for distributed deployments or multi-site networks due to their ability toreduce network traffic, since data is transferred in a highly compressed format. If the agent-based datacollection method is selected on the Managed Object creation, agents are installed automatically on theaudited computers.

To audit SharePoint farms and privileged user session activity, Netwrix Auditor employs the agent-baseddata collection method and provides native agents that must be installed in the audited environment tocollect audit data. Both agents can be installed either automatically (on the New Managed Object wizardcompletion), or manually.

Refer to the following sections below for manual installation instructions:

l Install Netwrix Auditor Agent for SharePoint

l Install Netwrix Auditor Agent to Audit Privileged User Session Activity

15/104

Page 16: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

3. Install Netwrix Auditor

3.2.1. Install Netwrix Auditor Agent for SharePointPrior to the agent installation, review the following prerequisites and make sure that:

l Netwrix Auditor Agent for SharePoint is going to be installed on the computer that hosts SharePointCentral Administration in the audited SharePoint farm.

l The SharePoint Administration (SPAdminV4) service is started on the target computer. SeeConfigure SharePoint Farm for Auditing for more information.

l The user that is going to run the agent installation:

l Is a member of the local Administrators group on SharePoint server, where the agent will bedeployed.

ll Is granted the SharePoint_Shell_Access role on SharePoint SQL Server configuration database.See Assign SharePoint_Shell_Access Role for more information.

NOTE: Your SharePoint sites may be unavailable during the agent installation and uninstallation.

To install Netwrix Auditor Agent for SharePoint manually

1. Navigate to %Netwrix Auditor installation folder%\Netwrix Auditor for SharePoint\ SharePointPackageand copy SpaPackage_<version>.msi to the computer where Central Administration is installed,

2. Run the installation package.

3. Follow the instructions of the setup wizard. When prompted, accept the license agreement andspecify the installation folder.

3.2.2. Install Netwrix Auditor Agent to Audit Privileged UserSession Activity

By default, the agent is installed automatically on the audited computers upon theNew Managed Objectwizard completion. If, for some reason, the installation has failed, you must install the agent manually oneach of the audited computers.

Before installing Netwrix Auditor agent to audit privileged user session activity, make sure that:

l The audit settings are configured properly. See Configure Computers for Auditing Privileged UserSession Activity for more information.

l The Data Processing Account has access to the administrative shares. See Configure Data ProcessingAccount Rights and Permissions for more information.

16/104

Page 17: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

3. Install Netwrix Auditor

To install Netwrix Auditor agent to audit privileged user session activity

1. Navigate to %Netwrix Auditor installation folder%\User Activity Video Reporter and copy theuavrfull_agent.msi file to the audited computer.

2. Run the installation package.

3. Follow the instructions of the setup wizard. When prompted, accept the license agreement andspecify the installation folder.

4. On the Agent Settings page, specify the host server (i.e. the name of the computer where NetwrixAuditor is installed) and the server TCP port.

17/104

Page 18: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4. Configure IT Infrastructure forAudit

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change auditingrequires a certain configuration of native audit settings in the audited environment and on the computerwhere Netwrix Auditor resides. Configuring your IT Infrastructure may also include enabling certain built-inWindows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise yourchange reports may contain warnings, errors or incomplete audit data.

The table below lists the native audit settings that must be adjusted to ensure collecting comprehensiveand reliable audit data.

Audited system Required configuration

Active Directory(including GroupPolicy)

In the audited environment:

l The ADSI Edit utility must be installed on any domain controller in theaudited domain. See Install ADSI Edit for more information.

l The Audit account management and the Audit directory service accesspolicies must be set to "Success" for the effective domain controllers policy.

l TheAudit logon events policy must be set to "Success" (or "Success" and"Failure") for the effective domain controllers policy.

l The Maximum Security event log size must be set to 300MB on pre-Windows Vista versions, or to 4GB on Windows Vista and above. Theretention method of the Security event logmust be set to “Overwrite eventsas needed”.

OR

Auto archiving must be enabled to prevent audit data loss if log overwritesoccur.

l The Object-level audit settings must be configured for theDomain,Configuration and Schema partitions.

l The AD tombstoneLifetime attribute must be set to "730".

On the computer where Netwrix Auditor is installed:

l Customize the retention period for the backup logs if necessary (by default,it is set to "50").

18/104

Page 19: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

Audited system Required configuration

EMC Storage In the audited environment:

l CIFS Network Protocol support is required.

l Security Event Log Maximum Size must be set to 4GB.

l TheAudit object access policy must be set to "Success" and "Failure" in theGroup Policy of the OU where the audited EMC VNX/VNXe/Celerra appliancebelongs to.

l Audit settings must be configured for CIFS File Shares. "Successful" and"Failed" must be set next to the following options:

l List Folder / Read Data

l Create Files / Write Data

l Create Folders / Append Data

l Write Attributes

l Write Extended Attributes

l Delete Subfolders and Files

l Delete

l Change Permissions

l Take Ownership

Event logs(including Cisco,IIS)

In the audited environment:

l For Windows- based platforms: the Remote Registry service must berunning and its Startup Type must be set to "Automatic".

l For Syslog- based platforms: the Syslog daemon must be configured toredirect events.

Exchange Server In the audited environment:

l The ADSI Edit utility must be installed on any domain controller in theaudited domain. See Install ADSI Edit for more information.

l The Audit account management and the Audit directory service accesspolicies must be set to "Success" for the effective domain controllers policy.

l TheAudit logon events policy must be set to "Success" (or "Success" and"Failure") for the effective domain controllers policy.

l The Maximum Security event log size must be set to 300MB on pre-

19/104

Page 20: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

Audited system Required configuration

Windows Vista versions, or to 4GB on Windows Vista and above. Theretention method of the Security event logmust be set to “Overwrite eventsas needed”.

OR

Auto archiving must be enabled to prevent audit data loss if log overwritesoccur.

l The Object-level audit settings must be configured for theDomain,Configuration and Schema partitions.

l The AD tombstoneLifetime attribute must be set to "730".

l The Administrator Audit Logging settings must be configured (only requiredfor Exchange Server 2010 and 2013).

l In order to audit mailbox access, the Logons logging level must be set to"Minimum" via the Exchange Management Shell.

NOTE: This is only required if you select the agentless data collectionmethod when auditing mailbox access.

On the computer where Netwrix Auditor is installed:

l Customize the retention period for the backup logs, if necessary (by default,it is set to "50").

NetApp Filer In the audited environment:

l CIFS Network Protocol support is required.

l Qtree Security must be configured. The volume where the audited file sharesare located must be set to the "ntfs" or "mixed" security style.

l The httpd.admin.enable or the httpd.admin.ssl.enable optionmust be set to "on". For security reasons, it is recommended to configure SSLaccess and enable the httpd.admin.ssl.enable option.

l The cifs.audit.enable and thecifs.audit.file_access_events.enable options must be set to "on".

l Unless you are going to audit logon events, the cifs.audit.logon_events.enable and the cifs.audit.account_mgmt_events.enable

options must be set to "off".

l Security Log must be configured:

l cifs.audit.logsize 300 000 000 (300 MB)

20/104

Page 21: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

Audited system Required configuration

l cifs.audit.autosave.onsize.enable on

l cifs.audit.autosave.file.extension timestamp

l Security Log Shared Folder must be specified.

l Audit settings must be configured for CIFS File Shares:

l "Successful" and "Failed" must be selected next to:

l List Folder / Read Data

l "Successful" must be selected next to the following options:

l Create Files / Write Data

l Create Folders / Append Data

l Write Attributes

l Write Extended Attributes

l Delete Subfolders and Files

l Delete

l Change Permissions

l Take Ownership

Privileged usersession activity

In the audited environment:

l TheWindows Management Instrumentation and theRemote Registryservice must be running and their Startup Type must be set to "Automatic".

l The File and Printer Sharing and theWindows ManagementInstrumentation features must be allowed to communicate throughWindows Firewall.

l Local TCP Port 9003 must be opened for inbound connections.

l Remote TCP Port 9002 must be opened for outbound connections.

On the computer where Netwrix Auditor is installed:

l TheWindows Management Instrumentation and theRemote Registryservices must be running and their Startup Type must be set to "Automatic".

l The File and Printer Sharing and theWindows ManagementInstrumentation features must be allowed to communicate throughWindows Firewall.

21/104

Page 22: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

Audited system Required configuration

l Local TCP Port 9002 must be opened for inbound connections.

SharePoint In the audited environment:

l The Audit Log Trimming setting must be set to "Yes" and Specify thenumber of days of audit log data to retainmust be set to 7 days.

l The Editing users and permissions option must be enabled.

l The SPAdminV4 service must be enabled (required for the Netwrix AuditorAgent for SharePoint installation).

On the computer where Netwrix Auditor is installed:

l TheNetTcpPortSharing service must be enabled.

SQL Server No configuration is required

VMware No configuration is required

Windows fileservers

In the audited environment:

l The following options must be set to "Successful" and "Failed" in theAdvanced Security settings for the audited shared folders:

l List Folder / Read Data

l Create Files / Write Data

l Create Folders / Append Data

l Write Attributes

l Write Extended Attributes

l Delete Subfolders and Files

l Delete

l Change Permissions

l Take Ownership

l TheAudit object access policy must set to "Success" and "Failure".

l The Advanced audit policy settings must be configured if you want to narrowthe scope of events collected by the product.

l The Security event log maximum size must be set to 300MB on pre-Windows Vista versions, or to 4GB on Windows Vista and above. Theretention method of the Security event logmust be set to “Overwrite events

22/104

Page 23: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

Audited system Required configuration

as needed”.

l TheRemote Registry service must be started.

Windows Server(including DNS)

In the audited environment:

l TheRemote Registry and theWindows Management Instrumentation(WMI) service must be started.

l The following audit policies must be configured depending on the OS:

l On pre-Windows Vista: the Audit account management and theAudit object access policy must be set to "Success".

l On Windows Vista and above: the Audit Security GroupManagement, Audit User Account Management, Audit HandleManipulation, Audit Other Object Access Events and Audit Registrypolicy must be set to "Success".

l The Security event log maximum size must be set to 300 MB on pre-Windows Vista versions, or to 4 GB on Windows Vista and above. Theretention method of the Security event logmust be set to “Overwrite eventsas needed”.

NOTE: If the audited servers are behind the Firewall, for configuration details referto the following Netwrix Knowledge Base articles: How to audit serverslocated in another subnet behind firewall and Ports required to monitorservers over the firewall.

Refer to the following topics for detailed instructions depending on the system you are going to audit:

l Configure Domain for Active Directory Auditing

l Configure EMC Storage for Auditing

l Configure Infrastructure for Auditing Event Logs

l Configure Infrastructure for Auditing Exchange Server

l Configure Domain for Auditing Group Policy

l Configure NetApp Filer for Auditing

l Configure Exchange Server for Auditing Mailbox Access

l Configure Computers for Auditing Privileged User Session Activity

l Configure SharePoint Farm for Auditing

l Configure Windows File Servers for Auditing

l Configure Windows Server for Auditing

23/104

Page 24: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4.1. Configure Domain for Auditing Active DirectoryYou can configure your Active Directory domain for auditing in one of the following ways:

l Automatically when creating a Managed Object.

If you select to automatically configure audit in the target environment, your current audit settingswill be checked on each data collection and adjusted if necessary.

NOTE: This method is recommended for evaluation purposes in test environments.If any conflictsare detected with your current audit settings, automatic audit configuration will not beperformed.

l Automatically through theActive Directory Audit Configurationwizard.

With this wizard you can configure audit settings for Active Directory, Group Policy and ExchangeServer. On each step, the wizard checks your audit settings and provides a report on their currentvalues. If any of your current settings conflict with the configuration required for the product tofunction properly, any such conflicts will be listed. In this case, you can choose whether you want toadjust your audit settings automatically and override your current settings, or if you want toconfigure them manually. For detailed instructions, refer to Configure Audit Automatically with ActiveDirectory Audit Configuration Wizard

l Manually. See Configure Active Directory Domain for Auditing Manually for more information.

4.1.1. Configure Audit Automatically with Active DirectoryAudit Configuration Wizard

You can configure audit settings in the target Active Directory domain automatically, through the ActiveDirectory Audit Configuration wizard. With this wizard you can configure audit settings for ActiveDirectory, Group Policy and Exchange Server.

To configure audit automatically through the Active Directory Audit Configuration wizard

NOTE: For the wizard to work properly, you must run it under an account that is a member of theDomainAdmins or Enterprise Admins group.

1. Launch the Active Directory Audit Configuration wizard. Navigate to %Netwrix Auditor installationfolder%\Active Directory Auditing . Locate the Active Directory Audit Configuration shortcut anddouble-click it to launch the wizard.

2. On the first step, specify the name of the domain that you want to configure for audit.

24/104

Page 25: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

3. Enable the Apply to the forest root domain option if you want to monitor changes to ActiveDirectory schema and configuration, as the forest root domain contains audit settings for theConfiguration and Schema partitions.

NOTE: Auditing of the Configuration partition is enabled by default. For instructions on how enableauditing of changes to the Schema partition, refer to Netwrix Auditor Administrator's Guide.

4. Select the effective policy that is currently applied to the domain controllers and that is subject tochange.

5. On the Domain Audit Policies step, specify the Data Processing Account that will be used byNetwrix Auditor to collect data from the audited domain.

25/104

Page 26: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

6. Click Detect. If your current settings do not match the configuration required for the product tofunction properly, a report will be displayed showing the current audit policy settings in themonitored domain as in the example below:

NOTE: If any of your other policies conflict with the settings required for the product to functionproperly, a warning message will be displayed listing these conflicts. If this happens, analyzecarefully how your environment will be affected before applying the required settings.

To apply the required configuration automatically, click Adjust. Your audit policy settings and theManage auditing and security log right will be adjusted and the confirmation dialog will bedisplayed on successful operation completion.

7. On the Object-Level Audit Settings step, click Detect to verify your object-level audit settings forthe Domain, Configuration and Schema partitions. Click Adjust to configure the required settings

26/104

Page 27: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

automatically.

8. On the Event Log Size and Retention Settings step, click Detect to verify your Security event logsize and retention settings. Click Adjust to configure the required settings automatically.

9. On the Exchange Server Administrator Audit Logging Settings step, click Detect to verify yourExchange Server Administrator Audit Logging settings. Click Adjust to configure the required settings

27/104

Page 28: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

automatically.

NOTE: This step is required only if the audited AD domain has an Exchange organization runningMicrosoft Exchange Server 2010 or 2013. Otherwise, skip this step.

10. Review your audit settings and complete the wizard.

4.1.2. Configure Active Directory Domain for AuditingManually

To configure your domain for auditing manually, perform the following procedures:

l Configure Domain Audit Policies

l Configure Security Event Log Size and Retention Settings

l Configure Object-Level Auditing

l Adjust Active Directory Tombstone Lifetime

4.1.2.1. Configure Domain Audit Policies

The domain audit policies must be configured to track changes to accounts and groups, and to identify theworkstation from which a change was made.

1. Open the Group Policy Management console on any domain controller in the target domain:navigate to Start → Administrative Tools → Group Policy Management.

2. In the left pane, navigate to Forest: <domain_name> → Domains → <domain_name> → DomainControllers. Right-click the effective domain controllers policy (by default, it is theDefault DomainControllers Policy), and select Edit from the pop-up menu.

3. In theGroup Policy Management Editor dialog, expand the Computer Configuration node on theleft and navigate to Policies → Windows Settings → Security Settings → Local Policies → AuditPolicy.

4. Set the Audit account management and the Audit directory service access policy to "Success".Set theAudit logon events policy to "Success" (or "Success" and "Failure").

28/104

Page 29: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

5.

NOTE: The Audit logon events policy is only required to collect the information on the originatingworkstation, i.e. the computer from which a change was made. This functionality is optionaland can be disabled. See Netwrix Auditor Administrator's Guide for more information.

6. Navigate to Start → Run and type '"cmd". Input the gpupdate /force command and press Enter.The group policy will be updated.

4.1.2.2. Configure Security Event Log Size and Retention Settings

Defining the Security event log size is essential for change auditing. If your Security log size is insufficient,overwrites may occur before data is written to the Audit Archive and the SQL database, and some auditdata may be lost. To prevent overwrites, you must increase the maximum size of the Security event log.

On Windows Server 2003 systems, where the maximum size of the Security event log cannot exceed 300MB (according to the following Microsoft Knowledge Base article: Event log may not grow to configuredsize), it is also recommended to enable automatic backup of the event log. With this option, the event logwill be archived and log overwrites will not occur on domain controllers.

The retention method of the Security event log must be set to “Overwrite events as needed” (unless it isset to “Archive the log when full” ). In this case, events will be written into the log even if it reaches itsmaximum size (new events will overwrite the oldest events in the log). Alternatively, you can enable autoarchiving for the Security event log to prevent audit data loss if log overwrites occur.

To adjust your Security event log size and retention settings, perform the following procedures:

l To increase the maximum size of the Security event log and set its retention method

l To enable Auto archiving centrally on all domain controllers

l To configure the retention period for the backup logs

29/104

Page 30: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

To increase the maximum size of the Security event log and set its retention method

1. Open the Group Policy Management console on any domain controller in the target domain:navigate to Start → Administrative Tools → Group Policy Management.

2. In the left pane, navigate to Forest: <domain_name> → Domains → <domain_name> → DomainControllers. Right-click the effective domain controllers policy (by default, it is theDefault DomainControllers Policy), and select Edit from the pop-up menu.

3. Navigate to Computer Configuration → Policies → Windows Settings →Security Settings →Event Log and double-click theMaximum security log size policy.

4. In the Maximum security log size Properties dialog, select Define this policy setting and setmaximum security log size to "299968" kilobytes (300MB) on pre-Windows Vista versions, or to"4194304" kilobytes (4GB) on Windows Vista and above.

30/104

Page 31: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

5. Select theRetention method for security log policy. In theRetention method for security logProperties dialog, check Define this policy and select Overwrite events as needed.

6. Navigate to Start → Run and type '"cmd". Input the gpupdate /force command and press Enter.The group policy will be updated.

31/104

Page 32: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

To enable Auto archiving centrally on all domain controllers

1. Open the Group Policy Management console on any domain controller in the target domain:navigate to Start → Administrative Tools → Group Policy Management.

2. In the left pane, navigate to Forest: <domain_name> → Domains → <domain_name> → DomainControllers. Right-click the effective domain controllers policy (by default, it is theDefault DomainControllers Policy), and select Edit from the pop-up menu.

3. Navigate to Computer Configuration → Policies. Right-click Administrative Templates: Policydefinitions and select Add / Remove templates. Click Add in the dialog that opens.

4. In the Policy Templates dialog, navigate to %Netwrix Auditor installation folder%/Active DirectoryAuditing, select the Log Autobackup.adm file (if the product is installed on a different computer,copy this file to the domain controller), and click Open.

NOTE: If you are running Widows Server 2003 or below, click View in the main menu, select Filteringand clearOnly show policy settings that can be fully managed.

5. Navigate to Administrative Templates: Policy definitions → Classic Administrative Templates→ System → Event Log. Select Automatically clear a full security event log and back up the logfile and set it to "Enable".

6. Navigate to Start → Run and type '"cmd". Input the gpupdate /force command and press Enter.The group policy will be updated.

To configure the retention period for the backup logs

1. On the computer where Netwrix Auditor is installed, open theRegistry Editor: navigate to Start→Run and type "regedit".

2. Depending on your OS, navigate to HKEY_LOCAL_MACHINE → SOFTWARE → Netwrix → ADChange Reporter (for 32-bit OS), or HKEY_LOCAL_MACHINE → SOFTWARE → Wow6432Node →Netwrix → AD Change Reporter (for 64-bit OS).

3. Double-click CleanAutoBackupLogs. The Edit DWORD Value dialog will open. This value defines thetime period (in hours) after which security event logs archives will be automatically deleted from thedomain controllers. By default, it is set to "50" (decimal). Modify this value, if necessary, and click OKto save the changes.

32/104

Page 33: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

NOTE: If the CleanAutoBackupLogs registry value is set to "0", you will have to remove the oldautomatic backups manually, or you may run out of space on your hard drive.

4.1.2.3. Configure Object-Level Auditing

Object-level Active Directory auditing must be configured so that the “Who” and “When” informationappears in audit reports. If, in addition to the Domain partition, you also want to audit changes to ADconfiguration and schema, you must enable object-level auditing for these partitions.

NOTE: Auditing of the Configuration partition is enabled by default. Refer to Netwrix AuditorAdministrator's Guide for detailed instructions on how to enable auditing of changes to theSchema partition in the target AD domain.

Perform the following procedures to configure object-level auditing for the Domain, Configuration andSchema partitions:

l To configure object-level auditing for the Domain partition

l To enable object-level auditing for the Configuration and Schema partitions

To configure object-level auditing for the Domain partition

1. Open the Active Directory Users and Computers console on any domain controller in the targetdomain: Navigate to Start → Administrative Tools → Active Directory Users and Computers.

2. In theActive Directory Users and Computers dialog, click View in the main menu and ensure thattheAdvanced Features are enabled.

33/104

Page 34: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

3. Right-click the <domain_name> node and select Properties. Select the Security tab and clickAdvanced. In theAdvanced Security Settings dialog, select theAuditing tab.

4. Do one of the following depending on the OS:

l On pre-Windows Server 2012 versions:

a. Click Add. In the Select user, Computer, Service account, or Group dialog, type"Everyone" in the Enter the object name to select field.

b. In the Audit Entry dialog that opens, set the "Successful" flag for all access entries except

34/104

Page 35: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

the following: Full Control, List Contents, Read All Properties and Read Permissions.

c. Make sure that theApply these auditing entries to objects and/or containers withinthis container only checkbox is cleared. Also, make sure that theApply onto parameteris set to "This object and all descendant objects".

l On Windows Server 2012 and above

a. Click Add. In theAuditing Entry dialog, click the Select a principal link.

b. In the Select user, Computer, Service account, or Group dialog, type "Everyone" in theEnter the object name to select field.

c. Set Type to "Success" and Applies to to "This object and all descendant objects".

d. Under Permissions, select all checkboxes except the following: Full Control, List Contents,Read All Properties and Read Permissions.

e. Scroll to the bottom of the list and make sure that the Only apply these auditingsettings to objects and/or containers within this container checkbox is cleared.

35/104

Page 36: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

To enable object-level auditing for the Configuration and Schema partitions

NOTE: To perform this procedure, you will need the ADSI Edit utility. In Windows Server 2003, this utility isa component of Windows Server Support Tools. In Windows Server 2008 and above, thiscomponent is installed together with the AD DS role, or it can be downloaded and installed alongwith Remote Server Administration Tools. Refer to Install ADSI Edit for detailed instructions on howto install the ADSI Edit utility.

1. Navigate to Start → Programs → Administrative Tools → ADSI Edit.

2. Right-click the ADSI Edit node and select Connect To. In the Connection Settings dialog, enableSelect a well-known Naming Context and select Configuration from the drop-down list.

36/104

Page 37: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

3. Expand theConfiguration <Your_Root_Domain_Name> node. Right-click theCN=Configuration,DC=<name>,DC=<name>… node and select Properties.

4. In theCN=Configuration, DC=<name>, DC=<name> Properties dialog select the Security tab andclick Advanced. In theAdvanced Security Settings for Configuration dialog, open theAuditingtab.

5. Do one of the following depending on the OS:

l On pre-Windows Server 2012 versions:

a. Click Add. In the Select user, Computer, Service account, or Group dialog, type"Everyone" in the Enter the object name to select field.

b. In the Audit Entry dialog that opens, set the "Successful" flag for all access entries exceptthe following: Full Control, List Contents, Read All Properties and Read Permissions.

37/104

Page 38: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

c. Make sure that theApply these auditing entries to objects and/or containers withinthis container only checkbox is cleared. Also, make sure that theApply onto parameteris set to "This object and all descendant objects".

l On Windows Server 2012 and above

a. Click Add. In theAuditing Entry dialog, click the Select a principal link.

b. In the Select user, Computer, Service account, or Group dialog, type "Everyone" in theEnter the object name to select field.

c. Set Type to "Success" and Applies to to "This object and all descendant objects".

d. Under Permissions, select all checkboxes except the following: Full Control, List Contents,Read All Properties and Read Permissions.

e. Scroll to the bottom of the list and make sure that the Only apply these auditingsettings to objects and/or containers within this container checkbox is cleared.

38/104

Page 39: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

6. Repeat these steps for the Schema container if necessary.

4.1.2.4. Adjust Active Directory Tombstone Lifetime

You can restore deleted Active Directory objects and their attributes using the Active Directory ObjectRestore tool integrated with Netwrix Auditor. The tool finds the information on deleted objects in theproduct snapshots (this data is stored in the Audit Archive, a local file-based storage of audit data) and ADtombstones.

To be able to restore deleted Active Directory objects, you must adjust the Active Directory tombstonelifetime property (set by default to 60 days in Windows Server 2003 and to 180 days in Windows Server2008 and above) so that it agrees with the Audit Archive retention period (2 years by default).

To change the tombstone lifetime attribute

NOTE: To perform this procedure, you will need the ADSI Edit utility. In Windows Server 2003, this utility isa component of Windows Server Support Tools. In Windows Server 2008 and above, thiscomponent is installed together with the AD DS role, or it can be downloaded and installed alongwith Remote Server Administration Tools. Refer to Install ADSI Edit for detailed instructions on howto install the ADSI Edit utility.

1. Navigate to Start → Programs → Administrative Tools → ADSI Edit.

2. Right-click the ADSI Edit node and select Connect To. In the Connection Settings dialog, enableSelect a well-known Naming Context and select Configuration from the drop-down list.

39/104

Page 40: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

3. Navigate to Configuration <Your_Root_Domain_Name →CN=Configuration,DC=<name>,DC=<name> → CN=Services → CN=Windows NT →CN=Directory Service. Right-click it and select Properties from the pop-up menu.

4. In the CN=Directory Service Properties dialog, locate the tombstoneLifetime attribute in theAttribute Editor tab.

5. Click Edit. Set the value to "730" (which equals 2 years).

40/104

Page 41: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4.2. Configure EMC Storage for AuditingTo configure EMC Storage for auditing, perform the following procedures:

l Configure Security Event Log Maximum Size to avoid overwriting of the security logs; it isrecommended to set security log size to a maximum (4GB).

By default, the security log is set to overwrite events that are older than 10 days, and its size is set to512 KB. The default location for the security.evt log is C:\security.evt, which corresponds to the rootpartition of the Data Mover. To be able to increase the security log size, you must move it from theData Mover root folder.

l Set theAudit object access policy set to "Success" and "Failure" in the Group Policy of the OU whereyour EMC VNX/VNXe/Celerra appliance belongs to. For more information on VNX/VNXe/Celerra GPOsupport, refer to documentation provided by EMC.

l Configure Audit Settings for CIFS File Shares on EMC VNX/ VNXe/ Celerra

4.2.1. Configure Security Event Log Maximum Size1. On your file server, create a new file system where the security log will be stored.

2. Mount this file system on a mount point, e.g. /events.

3. Make sure that it is accessible via the \\<file_server_name>\C$\events UNC path.

4. On the computer where Netwrix Auditor is installed, open Registry Editor: navigate to Start → Runand type "regedit".

5. Navigate to File → Connect Network Registry and specify the file server name.

6. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security andset the File value to "C:\events\security.evt".

7. Set theMaxSize value to "4 000 000 000 (decimal)".

NOTE: Due to Windows Server 2003 limitations, a security log larger than 300 MB cannot beprocessed.

8. Restart the corresponding Data Mover for the changes to take effect.

4.2.2. Configure Audit Settings for CIFS File Shares on EMCVNX/ VNXe/ Celerra

To configure audit settings for the CIFS file shares, perform the following procedure on the audited fileshare:

41/104

Page 42: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

l To configure audit settings for the CIFS file shares on pre-Windows Server 2012 versions

l To configure audit settings for the CIFS file shares on Windows Server 2012 and above

To configure audit settings for the CIFS file shares on pre-Windows Server 2012 versions

1. Navigate to the target file share, right-click it and select Properties.

2. In the <Share_Name> Properties dialog, select the Security tab and click Advanced.

3. In theAdvanced Security Settings for <Share_Name> dialog, navigate to theAuditing tab, clickEdit.

4. In a separate Advanced Security Settings for <Share_Name> dialog, click Add to add a principal.You can also select Everyone (or another user-defined group containing users that are grantedspecial permissions) and click Edit.

NOTE: You can specify any other user group, but in this case Netwrix Auditor will send emails withwarnings on incorrect audit configuration. This will not affect the Reports functionality andthe product will only audit user accounts that belong to the selected group.

5. In theAuditing Entry for <Share_Name> dialog, select Successful and Failed next to the followingoptions:

l To audit successful read access and failed read access attempts:

l List Folder / Read Data

l To audit successful modifications and failed modification attempts:

42/104

Page 43: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

l Create Files / Write Data

l Create Folders / Append Data

l Write Attributes

l Write Extended Attributes

l Delete Subfolders and Files

l Delete

l Change Permissions

l Take Ownership

6. Make sure that Apply onto is set to "This folder, subfolders and files", and Apply these auditingentries to objects and/or containers within this container only is cleared.

To configure audit settings for the CIFS file shares on Windows Server 2012 and above

1. Navigate to the target file share, right-click it and select Properties.

2. In the <Share_Name> Properties dialog, select the Security tab and click Advanced.

3. In theAdvanced Security Settings for <Share_Name> dialog, navigate to theAuditing tab. Click

43/104

Page 44: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

Add to add a new principal. You can also select Everyone (or another user-defined group containingusers that are granted special permissions) and click Edit.

NOTE: You can specify any other user group, but in this case Netwrix Auditor will send emails withwarnings on incorrect audit configuration. This will not affect the Reports functionality andthe product will only monitor user accounts that belong to the selected group.

4. In theAuditing Entry for <Share_Name> dialog, click on the Select a principal link and specifyEveryone.

5. Set Type to "All" and Applies to to "This folder, subfolder and files".

6. Click Show advanced permissions and select the following options:

l To audit successful read access and failed read access attempts:

l List Folder / Read Data

l To audit successful modifications and failed modification attempts:

l Create Files / Write Data

l Create Folders / Append Data

l Write Attributes

l Write Extended Attributes

l Delete Subfolders and Files

l Delete

l Change Permissions

l Take Ownership

44/104

Page 45: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

7. Make sure that theOnly apply these auditing settings to objects and/or containers within thiscontainer checkbox is cleared.

4.3. Configure Infrastructure for Auditing Event LogsDo one of the following depending on the OS:

l Configure Event Log Auditing on Windows Computers

l Configure Event Log Auditing on Syslog-Based Platforms

4.3.1. Configure Event Log Auditing on Windows ComputersTheRemote Registry service must be enabled on the target computers.

NOTE: You only need to perform this procedure if you choose to use the agentless data collectionmethod.

45/104

Page 46: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

1. Navigate to Start → Run and type "services.msc".

2. In the Services dialog locate theRemote Registry service, right-click it and select Properties.

3. In theRemote Registry Properties dialog, make sure that the Startup type parameter is set to"Automatic" and click Start.

4. In the Services dialog, ensure that Remote Registry has the "Started" (on pre-Windows Server 2012versions) or the "Running" (on Windows Server 2012 and above) status.

46/104

Page 47: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4.3.2. Configure Event Log Auditing on Syslog-BasedPlatforms

To be able to process Syslog events, you must configure the Syslog daemon to redirect these events to thecomputer where Netwrix Auditor is installed.

The procedure below explains how to configure redirection of Auth log, as predefined Syslog- basedplatforms in Netwrix Auditor have default rules to process this log only. You can create your own rules andconfigure syslog platform settings as described in the procedure below. See Netwrix AuditorAdministrator's Guide for more information.

To configure a Syslog daemon to redirect events for Red Hat Enterprise Linux 5

1. Open the /etc/syslog.conf file.

2. Add the following line: authpriv.* @FQDN/Netbios name or authpriv.* @ComputerIP.

NOTE: FQDN/Netbios name and ComputerIP must be the name and IP address of the computerwhere Netwrix Auditor is installed.

3. Navigate to the /etc/sysconfig/syslog file.

4. Change the SYSLOGD_OPTIONS value to SYSLOGD_OPTIONS="-r –m 0".

5. Launch theRHEL console and execute the following command: service syslog restart.

To configure a Syslog daemon to redirect events for Ubuntu 11

1. Navigate to the /etc/rsyslog.d/50-default.conf file.

2. Add the following line: authpriv.* @FQDN/Netbios name or authpriv.* @ComputerIP

NOTE: FQDN/Netbios name and ComputerIP must be the name and IP address of the computerwhere Netwrix Auditor is installed.

3. Launch theUBUNTU console and execute the following command: service rsyslog restart.

4.4. Configure Infrastructure for Auditing ExchangeServer

You can configure your infrastructure for auditing Exchange Server in one of the following ways:

l Automatically when creating a Managed Object.

If you select to automatically configure audit in the target environment, your current audit settingswill be checked on each data collection and adjusted if necessary.

47/104

Page 48: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

NOTE: This method is recommended for evaluation purposes in test environments.If any conflictsare detected with your current audit settings, automatic audit configuration will not beperformed.

l Automatically through theActive Directory Audit Configurationwizard.

With this wizard you can configure audit settings for Active Directory, Group Policy and ExchangeServer. On each step, the wizard checks your audit settings and provides a report on their currentvalues. If any of your current settings conflict with the configuration required for the product tofunction properly, any such conflicts will be listed. In this case, you can choose whether you want toadjust your audit settings automatically and override your current settings, or if you want toconfigure them manually. For detailed instructions, refer to Configure Audit Automatically with ActiveDirectory Audit Configuration Wizard

l Manually. You need to adjust the same audit settings as those required for auditing Active Directory.See Configure Active Directory Domain for Auditing Manually for more information. If your Exchangeorganization is running Exchange Server 2010 or 2013, you must also configure the AdministratorAudit Logging (AAL) Settings.

4.4.1. Configure Exchange Server Administrator Audit LoggingSettings

If the audited AD domain has an Exchange organization running Exchange Server 2010 or 2013, you mustconfigure the Exchange Server Administrator Audit Logging (AAL) settings. To do this, perform thefollowing procedure on any of the audited Exchange Servers (these settings will then be replicated to allExchange Servers in the domain).

To configure Exchange Server Administrator Audit Logging settings

1. On the computer where the audited Exchange Server is installed, navigate to Start → Programs →Exchange Management Shell.

2. Execute the following command depending on your Exchange Server version:

l Exchange Server 2010

Set-AdminAuditLogConfig -AdminAuditLogEnabled $true -AdminAuditLogAgeLimit 30 -AdminAuditLogCmdlets *

l Exchange Server 2013

Set-AdminAuditLogConfig -AdminAuditLogEnabled $true -AdminAuditLogAgeLimit 30 -AdminAuditLogCmdlets * -LogLevel Verbose

3. On the computer where Netwrix Auditor is installed, browse to the %Netwrix Auditor installationfolder%/Active Directory Auditing folder, locate the SetAALExcludedCmdlets.ps1 file and copy it tothe Exchange Server.

4. In Exchange Management Shell, in the command line, execute this file by specifying the path to it:

48/104

Page 49: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

<Path_To_ SetAALExcludedCmdlets_File>\SetAALExcludedCmdlets.ps1

This file contains a list of cmdlets that must be excluded from Exchange Server logging to reduceserver load.

4.5. Configure Domain for Auditing Group PolicyYou can configure your domain for auditing Group Policy in one of the following ways:

l Automatically when creating a Managed Object.

If you select to automatically configure audit in the target environment, your current audit settingswill be checked on each data collection and adjusted if necessary.

NOTE: This method is recommended for evaluation purposes in test environments.If any conflictsare detected with your current audit settings, automatic audit configuration will not beperformed.

l Automatically through theActive Directory Audit Configurationwizard.

With this wizard you can configure audit settings for Active Directory, Group Policy and ExchangeServer. On each step, the wizard checks your audit settings and provides a report on their currentvalues. If any of your current settings conflict with the configuration required for the product tofunction properly, any such conflicts will be listed. In this case, you can choose whether you want toadjust your audit settings automatically and override your current settings, or if you want toconfigure them manually. For detailed instructions, refer to Configure Audit Automatically with ActiveDirectory Audit Configuration Wizard

l Manually. You need to adjust the same audit settings as those required for auditing Active Directory.See Configure Active Directory Domain for Auditing Manually for more information.

4.6. Configure Exchange Server for Auditing MailboxAccess

Netwrix Auditor allows auditing non-owner mailbox access on Exchange Server 2003, 2007 and 2010, andprovides auditing agents that let you dispense with native Exchange Server auditing. Agents loginformation on all types of non-owner activities in other users' mailboxes (opening messages and folders,sending emails, etc.). If agents are disabled, only the access event itself is logged.

NOTE: Netwrix Auditor plans to support mailbox access auditing on Exchange Server 2013 in the futurereleases.

If you choose the agentless data collection method, you must configure native auditing on the auditedExchange Servers. Depending on the Exchange organization you are running, perform the followingprocedures:

49/104

Page 50: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

l To configure mailbox access auditing for Exchange Server 2003

l To configure mailbox access auditing for Exchange Server 2007 and 2010

To configure mailbox access auditing for Exchange Server 2003

1. On the computer where the audited Exchange Server is installed, navigate to Start → All Programs→ Microsoft Exchange → System Manager.

2. In the Exchange System Manager dialog, in the left pane, navigate to your Exchange Server, right-click it and select Properties from the pop-up menu.

3. In the Exchange Server Properties dialog, select theDiagnostics Logging tab.

4. Under Services, navigate to MSExchangeIS → Mailbox.

5. Under Categories, select Logons and set its logging level to "Minimum".

6. Navigate to Start → Run and type "services.msc". In the Services snap-in, locate a service calledMicrosoft Exchange Information Store and restart it.

To configure mailbox access auditing for Exchange Server 2007 and 2010

1. On the computer where the audited Exchange Server is installed, navigate to Start → Programs →Exchange Management Shell.

2. Execute the following command:

Set-EventLogLevel “MSExchangeIS\9000 Private\Logons” –Level Low

50/104

Page 51: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

3. Navigate to Start → Run and type "services.msc". In the Services snap-in, locate a service calledMicrosoft Exchange Information Store and restart it.

4.7. Configure NetApp Filer for Auditing

NOTE: CIFS must be set up on your NetApp filer in advance.

The instructions in this section apply to the default VFiler. To audit several VFiler instances, you mustperform these configuration steps for each of them.

NOTE: Currently, Netwrix Auditor can be configured to audit VFiler using HTTP only.

The following commands are used:

l To get an option value:

options <option_name>

l To set option value:

options <option_name> <option_value>

To configure NetApp filer appliances for auditing, perform the following procedures:

l Configure Qtree Security

l Configure Admin Web Access

l Configure Event Categories

l Configure Audit Settings for CIFS File Shares

4.7.1. Configure Qtree Security1. Navigate to the NetApp filer command prompt through the SSH/Telnet connection (depending on

your NetApp filer settings), or viaOnCommand System Manager.

2. Set the volume where the audited file shares are located to the "ntfs" or "mixed" security style:

51/104

Page 52: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4.7.2. Configure Admin Web AccessNetwrix Auditor uses the NetApp API to obtain the current CIFS audit configuration and force the auditdata flush from the internal filer format to an MS Event Viewer compatible format. Netwrix Auditorsupports both the SSL and non-SSL HTTP access, trying HTTPS first, and falling back to HTTP if it isunavailable.

1. Navigate to the NetApp filer command prompt through the SSH/Telnet connection (depending onyour NetApp filer settings), or viaOnCommand System Manager.

2. Make sure that the httpd.admin.enable or httpd.admin.ssl.enable option is set to "on". Forsecurity reasons, it is recommended to configure SSL access and enable thehttpd.admin.ssl.enable option.

4.7.3. Configure Event CategoriesPerform the following procedures to configure event categories:

l To configure audit event categories

l To configure Security log

l To configure logs retention period

l To specify Security log shared folder

To configure audit event categories

1. Navigate to the NetApp filer command prompt through the SSH/Telnet connection (depending onyour NetApp filer settings), or viaOnCommand System Manager.

2. Set the cifs.audit.enable and cifs.audit.file_access_events.enable options to "on".

3. Unless you are going to audit logon events, set the cifs.audit.logon_events.enable andcifs.audit.account_mgmt_events.enable options to "off".

NOTE: It is recommended to turn off logon audting in order to reduce the number of eventsgenerated.

52/104

Page 53: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

To configure Security log

1. Navigate to the NetApp filer command prompt through the SSH/Telnet connection (depending onyour NetApp filer settings), or viaOnCommand System Manager.

2. In order to avoid overwriting of the security logs, set the following values:

l cifs.audit.logsize 300 000 000 (300 MB)

l cifs.audit.autosave.onsize.enable on

l cifs.audit.autosave.file.extension timestamp

3. Disable the cifs.audit.liveview.enable option since it interferes with the normal Security logbehavior and prevents Netwrix Auditor from processing audit data properly.

4. To set up old logs deletion, you can configure the cifs.audit.autosave.file.limit option byspecifying the maximum number of files to be stored, or enable the built-in automatic log deletionoption in the Netwrix Auditor console.

Make sure there is enough disk space allotted to the security logs archives. Depending on the file accessactivity, audit data may grow rapidly, and the location specified for the security log (and security log autoarchives) must be large enough to hold data until it is processed by Netwrix Auditor (by default, datacollection runs every 24 hours). To set up old logs deletion, you can configure the

cifs.audit.autosave.file.limit option by specifying the maximum number of files to be stored,or logs retention.

To configure logs retention period

1. On the computer where Netwrix Auditor is installed, open Registry Editor: navigate to Start→ Runand type "regedit".

2. Depending on your OS, navigate to HKEY_LOCAL_MACHINE → SOFTWARE → Netwrix → FileServer Change Reporter (for 32- bit OS), or HKEY_ LOCAL_ MACHINE → SOFTWARE →Wow6432Node → Netwrix → File Server Change Reporter (for 64-bit OS).

3. Double-click CleanAutoBackupLogs. The Edit DWORD Value dialog will open.

This value defines the time period (in hours) after which security event logs archives will beautomatically deleted. By default, it is set to "50" (decimal). Modify this value, if necessary, and clickOK to save the changes.

NOTE: If theCleanAutoBackupLogs registry value is set to "0", you will have to remove the old logsmanually, or you may run out of space on your hard drive.

To specify Security log shared folder

Netwrix Auditor accesses audit logs via a specified file share. This may be either the default administrativeshare (ETC$, C$, etc.), or a custom file share.

53/104

Page 54: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

1. Navigate to the NetApp filer command prompt through the SSH/Telnet connection (depending onyour NetApp filer settings), or viaOnCommand System Manager.

2. Use the cifs shares command to create a new file share or configure an existing share.

4.7.4. Configure Audit Settings for CIFS File SharesTo configure audit settings for the CIFS file shares, perform the following steps on the audited file share:

1. Navigate to the root share folder, right-click it and select Properties.

2. Open the Security tab.

NOTE: If there is no such tab, it means a wrong security style has been specified for the volumeholding this file share. See Configure Qtree Security for more information.

3. Click Advanced and select theAuditing tab. Click Edit.

4. In the dialog that opens, select Everyone. Select Successful and Failed next to the following options:

l Select Successful and Failed to audit successful read access and failed read access attempts:

l List Folder / Read Data

l Select Successful to audit successful modification attempts:

l Create Files / Write Data

l Create Folders / Append Data

l Write Attributes

l Write Extended Attributes

l Delete Subfolders and Files

l Delete

l Change Permissions

l Take Ownership

5. Make sure that Apply these auditing entries to objects and/or containers within this containeronly is cleared. Also, make sure that theApply onto parameter is set to "This folder, subfolders and

54/104

Page 55: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

files".

4.8. Configure Computers for Auditing Privileged UserSession Activity

Perform the following procedures to configure computers for auditing privileged user session activity:

l Configure Data Collection Settings

l Configure Video Recordings Playback Settings

4.8.1. Configure Data Collection SettingsTo successfully track privileged user session activity, make sure that the following settings are configuredon the audited computers and on the computer where Netwrix Auditor is installed:

l TheWindows Management Instrumentation and theRemote Registry services are running andtheir Startup Type is set to "Automatic". See To check the status and startup type of Windowsservices for more information.

l The File and Printer Sharing and theWindows Management Instrumentation features areallowed to communicate through Windows Firewall. See To allow Windows features to communicatethrough Firewall for more information.

55/104

Page 56: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

l Local TCP Port 9002 is opened for inbound connections on the computer where Netwrix Auditor isinstalled. See To open Local TCP Port 9002 for inbound connections for more information.

l Local TCP Port 9003 is opened for inbound connections on the audited computers. See To openLocal TCP Port 9003 for inbound connections for more information.

l Remote TCP Port 9002 is opened for outbound connections on the audited computers. See To openRemote TCP Port 9002 for outbound connections for more information.

To check the status and startup type of Windows services

1. Navigate to Start → Run and type "services.msc".

2. In the Services snap-in, locate theRemote Registry service and make sure that its status is "Started"(on pre-Windows Server 2012 versions) and "Running" (on Windows Server 2012 and above). If it isnot, right-click the service and select Start from the pop-up menu.

3. Check that the Startup Type is set to "Automatic". If it is not, double-click the service. In theRemoteRegistry Properties dialog, in theGeneral tab, select "Automatic" from the drop-down list.

4. Perform the steps above for theWindows Management Instrumentation service.

To allowWindows features to communicate through Firewall

1. Navigate to Start → Control Panel and select Windows Firewall.

2. In the Help Protect your computer with Windows Firewall page, click Allow a program orfeature through Windows Firewall on the left.

3. In the Allow programs to communicate through Windows Firewall page that opens, locate theFile and Printer Sharing feature and make sure that the corresponding checkbox is selected underDomain.

4. Repeat step 3 for theWindows Management Instrumentation (WMI) feature.

To open Local TCP Port 9002 for inbound connections

1. On the computer where Netwrix Auditor is installed, navigate to Start → Control Panel and selectWindows Firewall.

2. In theHelp Protect your computer with Windows Firewall page, click Advanced settings on theleft.

3. In theWindows Firewall with Advanced Security dialog, select Inbound Rules on the left.

4. Click New Rule. In theNew Inbound Rule wizard, complete the steps as described below:

l On theRule Type step, select Program.

l On the Program step, specify the path: %Netwrix Auditor installation folder%/Netwrix/UserActivity Video Recorder/UAVRServer.exe.

56/104

Page 57: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

l On theAction step, select theAllow the connection action.

l On the Profile step, make sure that the rule applies to Domain.

l On theName step, specify the rule's name, for exampleUAVR Server inbound rule.

5. Double-click the newly created rule and open the Protocols and Ports tab.

6. In the Protocols and Ports tab, complete the steps as described below:

l Set Protocol type to "TCP".

l Set Local port to "Specific Ports" and specify to "9002".

To open Local TCP Port 9003 for inbound connections

1. On a target computer navigate to Start → Control Panel and select Windows Firewall.

2. In theHelp Protect your computer with Windows Firewall page, click Advanced settings on theleft.

3. In theWindows Firewall with Advanced Security dialog, select Inbound Rules on the left.

4. Click New Rule. In theNew Inbound Rule wizard, complete the steps as described below:

l On theRule Type step, select Program.

l On the Program step, specify the path to the agent: %SystemDrive%\Program Files (x86)\Netwrix\User Activity Video Recorder Agent.

l On theAction step, select theAllow the connection action.

l On the Profile step, make sure that the rule applies to Domain.

l On theName step, specify the rule's name, for exampleUAVR Agent inbound rule.

5. Double-click the newly created rule and open the Protocols and Ports tab.

6. In the Protocols and Ports tab, complete the steps as described below:

l Set Protocol type to "TCP".

l Set Local port to "Specific Ports" and specify to "9003".

To open Remote TCP Port 9002 for outbound connections

1. On a target computer, navigate to Start → Control Panel and select Windows Firewall.

2. In theHelp Protect your computer with Windows Firewall page, click Advanced settings on theleft.

3. In theWindows Firewall with Advanced Security dialog, select Inbound Rules on the left.

4. Click New RuleIn theNew Inbound Rule wizard, complete the steps as described below:

57/104

Page 58: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

l On theRule Type step, select Program.

l On the Program step, specify the path to the agent: %Netwrix%/User Activity Video RecorderAgent/UAVRAgent.exe.

l On theAction step, select theAllow the connection action.

l On the Profile step, make sure that the rule applies to Domain.

l On theName step, specify the rule's name, for exampleUAVR Agent outbound rule.

5. Double-click the newly created rule and open the Protocols and Ports tab.

6. In the Protocols and Ports tab, complete the steps as described below:

l Set Protocol type to "TCP".

l Set Remote port to "Specific Ports" and specify to "9002".

4.8.2. Configure Video Recordings Playback SettingsVideo recordings of users' activity can be watched in the Netwrix Auditor console. They are also available aslinks in web-based reports and attachments in the emails with Activity Summaries and subscriptions. To beable to watch video files captured by Netwrix Auditor, the following settings must be configured:

l Microsoft Internet Explorer 7.0 and above must be installed and ActiveX must be enabled.

l Internet Explorer security settings must be configured properly. See To configure Internet Explorersecurity settings for more information.

l JavaScript must be enabled. See To enable JavaScript for more information.

l Internet Explorer Enhanced Security Configuration (IE ESC) must be disabled. See To disable InternetExplorer Enhanced Security Configuration (IE ESC) for more information.

l The user must belong to the Netwrix User Activity Video Reporter Auditors group that has accessto theNetwrix_UAVR$ shared folder where video files are stored. Both the group and the folder arecreated automatically by Netwrix Auditor. See To add users to the Netwrix User Activity VideoReporter Auditors group for more information.

l A dedicated codec must be installed. This codec is installed automatically on the computer whereNetwrix Auditor is deployed, and on the monitored computers. To install it on a different computer,download it from http:/www.Netwrix.com/download/ScreenPressorNetwrix.zip.

To configure Internet Explorer security settings

1. In Internet Explorer, navigate to Tools → Internet Options.

2. Switch to the Security tab and select Local Intranet. Click Custom Level.

3. In the Security Settings – Local Intranet Zone dialog, scroll down to Downloads, and make sureFile download is set to "Enable".

58/104

Page 59: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4. In the Internet Options dialog switch to theAdvanced tab.

5. Scroll down to Security and make sureAllow active content to run in files on My Computer isselected.

To enable JavaScript

1. In Internet Explorer, navigate to Tools → Internet Options.

2. Switch to the Security tab and select Internet. Click Custom Level.

3. In the Security Settings – Internet Zone dialog, scroll down to Scripting and make sureActivescripting is set to "Enable".

To disable Internet Explorer Enhanced Security Configuration (IE ESC)

1. Navigate to Start → Administrative Tools → Server Manager.

2. In the Security Information section, click theConfigure IE ESC link on the right and turn it off.

To add users to the Netwrix User Activity Video Reporter Auditors group

Depending on the computer type (workstation or domain controller) where Netwrix Auditor is installed, doone of the following:

l If Netwrix Auditor is installed on a workstation:

1. Navigate to Start → Control Panel → Administrative Tools → Computer Management.

2. In the Computer Management dialog, in the left pane, navigate to System Tools → LocalUsers and Groups → Groups.

59/104

Page 60: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

3. In the right pane, right-click Netwrix User Activity Video Reporter Auditors, and selectProperties. Click Add and specify the users that you want to add to this group.

l If Netwrix Auditor is installed on a domain controller:

1. Navigate to Start → Administrative Tools → Active Directory Users and Computers.

2. Navigate to <your_domain_name> → Users.

3. In the right pane, right-click Netwrix User Activity Video Reporter Auditors, and selectProperties.

4. In the dialog that opens, select theMembers tab. Click Add and specify the users that you wantto add to this group.

4.9. Configure SharePoint Farm for AuditingYou can configure your SharePoint farm for auditing in one of the following ways:

l Automatically when creating a Managed Object . If you select to configure audit in the targetSharePoint farm automatically, your current audit settings will be checked on each data collectionand adjusted if necessary.

l Manually. Perform the following procedures:

l Configure Audit Log Trimming on your SharePoint farm.

l Configure Events Auditing Settings on your SharePoint farm.

l Enable Net. Tcp Port Sharing Service on the computer where Netwrix Auditor is installed.

l Enable SharePoint Administration Service on the computer where SharePoint CentralAdministration is installed and where you intend to deploy Netwrix Auditor Agent forSharePoint.

4.9.1. Configure Audit Log Trimming1. Log in as an administrator to the audited SharePoint site collection.

2. At the top level of your site collection, navigate to Settings → Site Settings.

3. Select Site collection audit settings under Site Collection Administration.

4. In theAudit Log Trimming section, do the following:

l Set Automatically trim the audit log for this site to "Yes".

l In Specify the number of days of audit log data to retain set retention to 7 days.

NOTE: You may keep the existing audit log retention provided that it is set to 7 days or less.

60/104

Page 61: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4.9.2. Configure Events Auditing Settings1. Log in as an administrator to the audited SharePoint site collection.

2. At the top level of your site collection, navigate to Settings → Site Settings.

3. Select Site collection audit settings under Site Collection Administration.

4. In the List, Libraries, and Sites section, select Editing users and permissions.

4.9.3. Enable Net. Tcp Port Sharing Service1. On the computer where Netwrix Auditor is installed, open the Services Management Console.

Navigate to Start → Run and type "services.msc".

2. Locate theNet. Tcp Port Sharing service (NetTcpPortSharing), right-click it and select Properties.

3. In theGeneral tab, set Startup type to "Manual" and click Apply.

4. Click Start to start the service.

4.9.4. Enable SharePoint Administration ServiceThis service is must be started to ensure the Netwrix Auditor Agent for SharePoint successful installation.Perform the procedure below, prior to the agent installation. See Install Netwrix Auditor Agent forSharePoint for more information.

1. On the computer where SharePoint Central Administration is installed and where you intend todeploy Netwrix Auditor Agent for SharePoint, open the Services Management Console. Navigate toStart → Run and type "services.msc".

2. Locate the SharePoint Administration service (SPAdminV4), right-click it and select Properties.

3. In theGeneral tab, set Startup type to "Automatic" and click Apply.

4. Click Start to start the service.

4.10. Configure Windows File Servers for AuditingBefore configuring the audit settings, consider that if you have multiple file shares frequently accessed bya significant number of users, it is reasonable to audit objects modification only. Tracking all access eventsmay result in too much data written to the audit logs, whereas only some part of it may be of any interest.Note that audit flags must be set on every file share you want to audit.

If you are going to audit an entire file server, consider the following:

l If you specify a single computer name, Netwrix Auditor will audit all shared folders on this computerexcept the folders whose name ends with the $ symbol (which are either hidden or

61/104

Page 62: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

administrative/system folders). In order for the report functionality to work properly, you need toconfigure audit settings for each share folder on the computer separately. Otherwise, reports willcontain limited data and warning messages.

l For your convenience, if your file shares are stored within one folder (or disk drive), you can configureaudit settings for this folder only. As a result, you will receive reports on all required access typesapplied to all file shares within this folder. It is not recommended to configure audit settings forsystem disks.

To configure audit settings for Windows file servers, perform the following procedures:

l Configure Object-Level Access Auditing

l Configure Audit Object Access Policy

l Configure Event Log Size and Retention Settings

l Enable Remote Registry Service

4.10.1. Configure Object-Level Access AuditingPerform one of the following procedures depending on the OS:

l To configure Object-level access auditing on pre-Windows Server 2012 versions

l To configure Object-level access auditing on Windows Server 2012 and above

To configure Object-level access auditing on pre-Windows Server 2012 versions

1. Navigate to the target file share, right-click it and select Properties.

2. In the <Share_Name> Properties dialog, select the Security tab and click Advanced.

3. In theAdvanced Security Settings for <Share_Name> dialog, navigate to theAuditing tab, clickEdit.

4. In a separate Advanced Security Settings for <Share_Name> dialog, click Add to add a principal.You can also select Everyone (or another user-defined group containing users that are grantedspecial permissions) and click Edit.

62/104

Page 63: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

NOTE: You can specify any other user group, but in this case Netwrix Auditor will send emails withwarnings on incorrect audit configuration. This will not affect the Reports functionality andthe product will only audit user accounts that belong to the selected group.

5. In theAuditing Entry for <Share_Name> dialog, select Successful and Failed next to the followingoptions:

l To audit successful read access and failed read access attempts:

l List Folder / Read Data

l To audit successful modifications and failed modification attempts:

l Create Files / Write Data

l Create Folders / Append Data

l Write Attributes

l Write Extended Attributes

l Delete Subfolders and Files

l Delete

l Change Permissions

l Take Ownership

63/104

Page 64: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

6. Make sure that Apply onto is set to "This folder, subfolders and files", and Apply these auditingentries to objects and/or containers within this container only is cleared.

To configure Object-level access auditing on Windows Server 2012 and above

1. Navigate to the target file share, right-click it and select Properties.

2. In the <Share_Name> Properties dialog, select the Security tab and click Advanced.

3. In theAdvanced Security Settings for <Share_Name> dialog, navigate to theAuditing tab. ClickAdd to add a new principal. You can also select Everyone (or another user-defined group containingusers that are granted special permissions) and click Edit.

NOTE: You can specify any other user group, but in this case Netwrix Auditor will send emails withwarnings on incorrect audit configuration. This will not affect the Reports functionality andthe product will only monitor user accounts that belong to the selected group.

4. In theAuditing Entry for <Share_Name> dialog, click on the Select a principal link and specifyEveryone.

5. Set Type to "All" and Applies to to "This folder, subfolder and files".

6. Click Show advanced permissions and select the following options:

64/104

Page 65: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

l To audit successful read access and failed read access attempts:

l List Folder / Read Data

l To audit successful modifications and failed modification attempts:

l Create Files / Write Data

l Create Folders / Append Data

l Write Attributes

l Write Extended Attributes

l Delete Subfolders and Files

l Delete

l Change Permissions

l Take Ownership

7. Make sure that theOnly apply these auditing settings to objects and/or containers within thiscontainer checkbox is cleared.

4.10.2. Configure Audit Object Access Policy1. Open the Group Policy Management console on any domain controller in the target domain:

navigate to Start → Administrative Tools → Group Policy Management.

65/104

Page 66: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

2. In the left pane, navigate to Forest: <domain_name> → Domains, right-click <domain_name>and select Create a GPO in this domain and Link it here.

3. Enter the name for the new GPO.

4. Right-click the newly created GPO and select Edit.

5. In theGroup Policy Management Editor dialog, expand the Computer Configuration node on theleft and navigate to Policies → Windows Settings → Security Settings → Local Policies → AuditPolicy.

6. In the right pane, double-click Audit object access and select all checkboxes in the Audit objectaccess Properties dialog.

66/104

Page 67: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

Refer to the Windows Server TechCenter article for more information: Create a new Group Policy object:Group Policy. If you want to use a local policy, refer for instructions in the following Windows ServerTechCenter article: Define or modify auditing policy settings for an event category: Auditing.

4.10.3. Configure Advanced Audit PolicyConfiguring advanced audit will help you narrow the range of events tracked and recorded by the product,thus preventing your local Audit Archive and the Security event log from overfilling.

NOTE: Currently, Netwrix Auditor ignores the Advanced audit policy settings, as a result you will be gettingwarning messages if the audit policy subcategory configuration is applied. These warning messagescan be ignored, as they do not affect the product functionality. Netwrix plans to support Advancedauditing policies in the future releases.

Perform one of the following procedures depending on the OS version:

l To configure Advanced audit policy on Windows Server 2008 / Windows Vista

l To configure Advanced audit policy on Windows Server 2008 R2 / Windows 7 and above

To configure Advanced audit policy on Windows Server 2008 / Windows Vista

In Windows Server 2008 / Windows Vista, audit policies are not integrated with the Group Policies and canonly be deployed by using logon scripts generated with the native Windows аuditpol.exe command linetool. Therefore, these settings are not permanent and will be lost after server reboot.

NOTE: The procedure below explains how to configure Advanced audit policy on a single file server. If youaudit multiple file servers, you may want to create logon scripts and distribute them to all target

67/104

Page 68: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

machines via Group Policy. Refer to Microsoft Knowledge Base article: How to use Group Policy toconfigure detailed security auditing settings for more information.

1. On an audited file server, open the Local Security Policy snap-in: navigate to Start → All Programs→ Administrative Tools → and select Local Security Policy .

2. Navigate to Security Settings → Local Policies → Security Options and locate the Audit: Forceaudit policy subcategory settings (Windows Vista or later) policy.

3. Double-click the policy to enable it.

4. Disable theObject Access category by executing the following command in the command lineinterface:

auditpol /set /category:"Object Access" /success:disable /failure:disable

5. Enable the following audit subcategories:

l Handle Manipulation {0CCE9223-69AE-11D9-BED3-505054503030}.

l File System {0CCE921D-69AE-11D9-BED3-505054503030}

Execute the following commands in the command line interface:

auditpol /set /subcategory:”File System” /success:enable /failure:enable

auditpol /set /subcategory:”Handle Manipulation” /success:enable/failure:enable

NOTE: It is recommended to disable all other subcategories unless you need them for otherpurposes. You can check your current effective settings by executing the following command:auditpol /get /category:"Object Access".

68/104

Page 69: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

To configure Advanced audit policy on Windows Server 2008 R2 / Windows 7 and above

In Windows Server 2008 R2 and Windows 7 and above, Advanced audit policies are integrated with GroupPolicies, so they can be applied via Group Policy Object or Local Security Policies. The procedure belowdescribes how to apply Advanced policies via Local Policies.

1. On an audited file server, open the Local Security Policy snap-in: navigate to Start → All Programs→ Administrative Tools → and select Local Security Policy .

2. Navigate to Security Settings → Local Policies → Security Options and locate the Audit: Forceaudit policy subcategory settings (Windows Vista or later) policy.

3. Double-click the policy to enable it.

4. Navigate to Security Settings → Advanced Audit Policy Configuration → System Audit Policies→ Object Access and enable the following subcategories:

l Audit File System

l Audit Handle Manipulation

To do this, double click a subcategory, select Configure the following audit events. Select Successand/or Failure depending on the type of events you want to track.

NOTE: You can check your current effective settings by executing the following command: auditpol

/get /category:"Object Access".

69/104

Page 70: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4.10.4. Configure Event Log Size and Retention SettingsThe procedure below describes one of the possible ways to adjust event log settings. If you have multipletarget computers, you need to perform this procedure on each of them.

NOTE: If you move security log files from the default system folder to a non-default one, you must rebootyour target server for the Reports functionality to work properly.

1. On a target server, navigate Start → Programs → Administrative Tools → Event Viewer.

2. Navigate to Event Viewer tree → Windows Logs, right-click Security and select Properties.

3. Make sure Enable logging is selected.

4. In theMaximum log size field specify the size:

l On pre-Windows Vista versions—300MB

l On Windows Vista and above—4GB

5. Make sure Do not overwrite events (Clear logs manually) is cleared. If this option is selected,change the retention method by selecting another option: Overwrite events as needed (oldestevents first).

70/104

Page 71: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4.10.5. Enable Remote Registry Service

To enable the Remote Registry service

1. Navigate to Start → Run and type "services.msc".

2. In the Services dialog locate theRemote Registry service, right-click it and select Properties.

3. In theRemote Registry Properties dialog, make sure that the Startup type parameter is set to"Automatic" and click Start.

71/104

Page 72: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

4. In the Services dialog, ensure that Remote Registry has the "Started" (on pre-Windows Server 2012versions) or the "Running" (on Windows Server 2012 and above) status.

4.11. Configure Windows Server for AuditingYou can configure Windows Servers for auditing in one of the following ways:

l Automatically when creating a Managed Object.

If you select to automatically configure audit in the target environment, your current audit settingswill be checked on each data collection and adjusted if necessary.

NOTE: This method is recommended for evaluation purposes in test environments.If any conflictsare detected with your current audit settings, automatic audit configuration will not beperformed.

l Manually. Perform the following procedures:

l Enable Remote Registry and Windows Management Instrumentation Services

l Configure Windows Registry Audit Settings

l Configure Local Audit Policies

l Configure Event Log Size and Retention Settings

4.11.1. Enable Remote Registry and Windows ManagementInstrumentation Services

1. Navigate to Start → Run and type "services.msc".

2. In the Services dialog locate theRemote Registry service, right-click it and select Properties.

72/104

Page 73: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

3. In theRemote Registry Properties dialog, make sure that the Startup type parameter is set to"Automatic" and click Start.

4. In the Services dialog, ensure that Remote Registry has the "Started" (on pre-Windows Server 2012versions) or the "Running" (on Windows Server 2012 and above) status.

5. Locate theWindows Management Instrumentation service and repeat these steps.

4.11.2. Configure Windows Registry Audit SettingsWindows Registry audit permissions must be configured so that the “Who” and “When” values arereported correctly for each change. Configure these settings on each Windows server you want to audit.

The following audit permissions must be set to "Successful" for the HKEY_LOCAL_MACHINE\SOFTWARE,

HKEY_LOCAL_MACHINE\SYSTEM and HKEY_USERS\.DEFAULT keys:

l Set Value

l Create Subkey

l Delete

l Write DAC

l Write Owner

Perform one of the following procedures depending on the OS version:

l To configure Windows registry audit settings on pre-Windows Server 2012 versions

l To configure Windows registry audit settings on Windows Server 2012 and above

73/104

Page 74: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

To configure Windows registry audit settings on pre-Windows Server 2012 versions

1. On your target server, open Registry Editor: navigate to Start → Run and type "regedit".

2. In the registry tree, expand theHKEY_LOCAL_MACHINE key, right-click SOFTWARE and selectPermissions from the pop-up menu.

3. In the Permissions for SOFTWARE dialog, click Advanced.

4. In theAdvanced Security Settings for SOFTWARE dialog, select theAuditing tab and click Add.

5. Select the Everyone group.

6. In theAuditing Entry for SOFTWARE dialog, select "Successful" for the following access types: SetValue, Create Subkey,Delete,Write DAC, and Write Owner.

7. Repeat the same steps for the HKEY_LOCAL_MACHINE\SYSTEM and HKEY_USERS\.DEFAULT keys.

To configure Windows registry audit settings on Windows Server 2012 and above

1. On your target server, open Registry Editor: navigate to Start → Run and type "regedit".

2. In the registry tree, expand theHKEY_LOCAL_MACHINE key, right-click SOFTWARE and selectPermissions from the pop-up menu.

3. In the Permissions for SOFTWARE dialog, click Advanced.

4. In theAdvanced Security Settings for SOFTWARE dialog, select theAuditing tab and click Add.

5. Click Select a principal link and specify the Everyone group in the Enter the object name toselect field.

74/104

Page 75: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

6. Set Type to "Successful" and Applies to to "This key and subkeys".

7. Click Show advanced permissions and select the following access types: Set Value, Create Subkey,Delete,Write DAC, and Write Owner.

8. Repeat the same steps for the HKEY_LOCAL_MACHINE\SYSTEM and HKEY_USERS\.DEFAULT keys.

4.11.3. Configure Local Audit PoliciesLocal audit policies must be configured on the target servers to get the “Who” and “When” values for thechanges to the following monitored system components:

l Services

l Hardware and system drivers

l Windows registry

l Scheduled tasks

l Local users and groups

NOTE: There are several methods to configure local audit policies, and this guide covers just one of them.Consider the possible impact on your environment and select the method that best suits yourpurposes. Note that if you follow the procedures below, audit settings will be applied to the wholedomain.

Refer to the Windows Server TechCenter article for additional information: Create a new Group Policyobject: Group Policy. If you want to use the local policy, refer to the following Windows Server TechCenterarticle: Define or modify auditing policy settings for an event category: Auditing.

75/104

Page 76: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

Perform one of the following procedures depending on the OS version:

l To configure local audit policies on pre-Windows Vista versions

l To configure local audit policies on Windows Vista and above

To configure local audit policies on pre-Windows Vista versions

1. Open the Group Policy Management console on any domain controller in the target domain:navigate to Start → Administrative Tools → Group Policy Management.

2. In the left pane, navigate to Forest: <domain_name> → Domains, right-click <domain_name>and select Create a GPO in this domain and Link it here.

3. Enter the name for the new GPO.

4. Right-click the newly created GPO and select Edit.

5. In theGroup Policy Management Editor dialog, expand the Computer Configuration node on theleft and navigate to Policies → Windows Settings → Security Settings → Local Policies → AuditPolicy.

6. Double-click Audit account management on the right, select Success in the properties dialog.

7. Double-click Audit object access on the right, select Success in the properties dialog.

8. Navigate to Start → Run and type '"cmd". Input the gpupdate /force command and press Enter.The group policy will be updated.

To configure local audit policies on Windows Vista and above

1. Open the Group Policy Management console on any domain controller in the target domain:navigate to Start → Administrative Tools → Group Policy Management.

2. In the left pane, navigate to Forest: <domain_name> → Domains, right-click <domain_name>and select Create a GPO in this domain and Link it here.

3. Enter the name for the new GPO.

4. Right-click the newly created GPO and select Edit.

5. In the Group Policy Management Editor dialog, expand the Computer Configuration node on theleft and navigate to Policies → Windows Settings → Security Settings → Advanced Audit PolicyConfiguration → Audit Policies → Account Management.

76/104

Page 77: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

6. Double-click Audit Security Group Management on the right, select Success in the propertiesdialog.

7. Double-click Audit User Account Management on the right, select Success in the properties dialog.

8. LocateObject Access under theAudit Policies node.

9. Double-click Audit Handle Manipulation on the right, select Success in the properties dialog.

10. Repeat the previous step for theAudit Other Object Access Events and Audit Registry policies.

11. Navigate to Start → Run and type '"cmd". Input the gpupdate /force command and press Enter.The group policy will be updated.

4.11.4. Configure Event Log Size and Retention SettingsTo prevent data loss, you need to specify the maximum size for the Application, Security, System andMicrosoft-Windows-TaskScheduler/ Operational event logs. The procedure below provides you with justone of a number of possible ways to specify the event log settings. If you have multiple target computers,you need to perform this procedure on each of them.

To configure the event log size and retention method

1. On a target server, navigate Start → Programs → Administrative Tools → Event Viewer.

2. Navigate to Event Viewer tree → Windows Logs, right-click Security and select Properties.

77/104

Page 78: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

4. Configure IT Infrastructure for Audit

3. Make sure Enable logging is selected.

4. In theMaximum log size field specify the size:

l On pre-Windows Vista versions—300MB

l On Windows Vista and above—4GB

5. Make sure Do not overwrite events (Clear logs manually) is cleared. If this option is selected,change the retention method by selecting another option: Overwrite events as needed (oldestevents first).

6. Repeat these steps for theApplicationand System event logs underWindows Logs, and forMicrosoft-Windows-TaskScheduler/Operational event log underApplications and Services Logs→ Microsoft → Windows → TaskScheduler → Operational.

78/104

Page 79: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

5. Configure Data ProcessingAccount Rights and Permissions

The Data Processing Account is specified on Managed Object creation and is used by Netwrix Auditor tocollect audit data from the target systems and applications.

In most cases, this account must be a member of the Domain Admins group, provided that theworkstation with Netwrix Auditor installed and the audited system belong to the same domain.

If the computer where Netwrix Auditor is installed and the audited system belong to different workgroupsor domains, the audited system must have accounts with the same name and password as the accountunder which Netwrix Auditor runs. All these accounts must belong the local Administrators group.

To ensure successful data collection the Data Processing Account must comply with the followingrequirements depending on the audited system.

Audited system Rights and permissions

Active Directory l A member of the Domain Admins group / the Manage auditing andsecurity log policy must be defined for this account

l The Log on as a batch job policy must be defined for this account—isapplied automatically

l A member of the local Administrators group on the computer where theproduct is installed

l TheRead rights to the Active Directory Deleted Objects container

l If event logs autobackup is enabled: permissions to the following registry keyon each domain controller in the target domain:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EventLog\Security

AND

a member of one of the following groups: Administrators, Print Operators,Server Operators

l If event logs autobackup is enabled: the Share Read and Write permissionsand the Security Full control permissions for the logs backup folder

l The Database owner role must be assigned to this account if it going toaccess the SQL database with audit data

l TheContent Manager role on the SSRS Home folder

EMC Storage l A member of the local Administrators group

79/104

Page 80: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

Audited system Rights and permissions

If the computer where the product is installed and the audited serversbelong to different domains, the target computers must have accounts withthe same name and password as the Data Processing Account. All theseaccount must be assigned the local Administrators permissions.

l The Log on as a batch job policy defined for this account

l TheManage auditing and security log policy defined for this account

l TheDatabase owner role must be assigned to this account if it going toaccess the SQL database with audit data

l Read access to the monitored shared folders

l TheContent Manager role on the SSRS Home folder

Event logs(including Cisco,IIS)

ll A member of the local Administrators group

l The Log on as a batch job policy must be defined for this account

l The Database owner role must be assigned to this account if it going toaccess the SQL database with audit data

l The Content Manager role must be assigned to this account on the SSRSHome folder

Exchange Server l A member of theDomain Admins group / TheManage auditing andsecurity log policy defined for this account

l The Log on as a batch job policy defined for this account—is appliedautomatically

l The account must belong to theOrganization Management or RecordsManagement group / the Audit Logs management role must be assignedto this account (only required if the audited AD domain has an Exchangeorganization running MS Exchange Server 2010 or 2013).

l TheRead rights to the Active Directory Deleted Objects container

l If event logs autobackup is enabled: permissions to the following registry keyon each DC in the target domain:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EventLog\Security

AND

the member of one of the following groups: Administrators, PrintOperators, Server Operators

l If event logs autobackup is enabled: theShare Read and Write permissions

80/104

Page 81: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

Audited system Rights and permissions

and Security Full control permissions for the logs backup folder

l TheDatabase owner role must be assigned to this account if it going toaccess the SQL database with audit data

l TheContent Manager role on the SSRS Home folder

Group Policy l A member of theDomain Admins group / Manage auditing and securitylog policy defined for this account

l The Log on as a batch job policy defined for this account—is appliedautomatically

l TheRead rights to the Active Directory Deleted Objects container

l If event logs autobackup is enabled: permissions to the following registry keyon each domain controller in the target domain:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\EventLog\Security

AND

a member of one of the following groups: Administrators, Print Operators,Server Operators

l If event logs autobackup is enabled: the Share Read and Write permissionsand the Security Full control permissions for the logs backup folder a

l The Database owner role must be assigned to this account if it going toaccess the SQL database with audit data

l TheContent Manager role on the SSRS Home folder

Inactive users inActive Directory

l A member of theDomain Admins group

l The Log on as a batch job policy must be defined for this account

NetApp Filer l A member of the local Administrators group

If the computer where the product is installed and the audited serversbelong to different domains, the target computers must have accounts withthe same name and password as the Data Processing Account. All theseaccount must be assigned the local Administrators permissions.

l The Log on as a batch job policy must be defined for this account

l The Manage auditing and security log policy must be defined for thisaccount

l The Database owner role must be assigned to this account if it going to

81/104

Page 82: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

Audited system Rights and permissions

access the SQL database with audit data

l Read access to the monitored shared folders

l NetApp Filer account should have the following capabilities:

l login-http-admin

l api-system-cli

l api-options-get

l cli-cifs

l TheContent Manager role on the SSRS Home folder

Mailbox accesswithin ExchangeServer

l A member of theDomain Admins group (to audit several Exchange Serversin the domain where Netwrix Auditor is installed) / A member of theEnterprise Admins group (to audit Exchange Servers in different domainsbelonging to the same forest)

Passwordexpiration inActive Directory

l A member of theDomain Admins group

l The Log on as a batch job policy must be defined for this account

Privileged usersession activity

l A member of the local Administrators group

l TheWrite permissions for the product logs and the Audit Archive folder

l The Log on as a batch job policy defined for this account

l TheDatabase owner role must be assigned to this account if it going toaccess the SQL database with audit data

l TheContent Manager role must be assigned to this account on the SSRSHome folder

SharePoint Required for Netwrix Auditor to function properly:

l A member of the local Administrators group

l A member of theDomain Users group

l The Log on as a service policy must be defined for this account

l The Database owner role must be assigned to this account if it going toaccess the SQL database with audit data

l The Content Manager role must be assigned to this account on the SSRSHome folder

82/104

Page 83: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

Audited system Rights and permissions

Required for the automatic installation of Netwrix Auditor Agent forSharePoint:

l A member of the local Administrators group on SharePoint server, wherethe agent will be deployed

l The SharePoint_ Shell_ Access role on the SharePoint SQL Serverconfiguration database

SQL Server l A member of the local Administrators group

l The System Administrator role on the target SQL Server

If the computer where the product is installed and the audited SQL Serverbelong to different domains, the audited servers must have accounts withthe same name and password as the Data Processing Account. This accountmust be granted the System Administrator role on the audited SQL Serverand be a member of the local Administrators group on the computerwhere the product is installed.

l The Log on as a batch job policy defined for this account

l TheDatabase owner role must be assigned to this account if it going toaccess the SQL database with audit data

l TheContent Manager role must be assigned to this account on the SSRSHome folder

VMware l A member of the local Administrators group

l At least Read-onlyrole on the monitored server(s)

l The Log on as a batch job policy defined for this account

l The Database owner role assigned to account that is going to access theSQL database with audit data

l The Content Manager role must be assigned to this account on the SSRSHome folder

Windows fileservers

l A member of the local Administrators group

If the computer where the product is installed and the audited serversbelong to different domains, the target computers must have accounts withthe same name and password as the Data Processing Account. All theseaccount must be assigned the local Administrators permissions.

l The Log on as a batch job policy must be defined for this account

83/104

Page 84: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

Audited system Rights and permissions

l The Manage auditing and security log policy must be defined for thisaccount

l TheDatabase owner role must be assigned to this account if it going toaccess the SQL database with audit data

l Read access to the monitored shared folders

l TheContent Manager role on the SSRS Home folder

Windows Server(including DNS)

l A member of the local Administrators group

If the computer where the product is installed and the audited serversbelong to different domains, the target computers must have accounts withthe same name and password as the Data Processing Account. All theseaccount must be assigned the local Administrators permissions.

l The Log on as a batch job policy defined for this account

l The Manage auditing and security log policy must be defined for thisaccount

l The Database owner role must be assigned to this account if it going toaccess the SQL database with audit data

l The Content Manager role must be assigned to this account on the SSRSHome folder

Follow the procedures below to configure Data Processing Account account rights and permissions:

l Configure Manage Auditing And Security Log Policy

l Define Log On As A Batch Job Policy

l Define Log On As A Service Policy

l Assign Database Owner Role (db_owner)

l Assign System Administrator Role

l Grant Permissions for AD Deleted Objects Container

l Assign Permissions To Registry Key

l Add Account to Organization Management Group

l Assign Audit Logs Role To Account

l Assign Content Manager Role To Account

l Assign SharePoint_Shell_Access Role

84/104

Page 85: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

5.1. Configure Manage Auditing And Security LogPolicy

NOTE: Perform this procedure only if the Data Processing Account does not belong to theDomainAdmins group.

1. Open the Group Policy Management console on any domain controller in the target domain:navigate to Start → Administrative Tools → Group Policy Management.

2. In the left pane, navigate to Forest: <domain_name> → Domains → <domain_name> → DomainControllers. Right-click the effective domain controllers policy (by default, it is theDefault DomainControllers Policy), and select Edit from the pop-up menu.

3. In theGroup Policy Management Editor dialog, expand theComputer Configuration node on theleft and navigate to Policies → Windows Settings → Security Settings → Local Policies.

4. On the right, double-click theUser Rights Assignment policy.

5. Locate theManage auditing and security log policy and double-click it.

6. In theManage auditing and security log Properties dialog, click Add User or Group, specify theuser that you want to define this policy for.

7. Navigate to Start → Run and type '"cmd". Input the gpupdate /force command and press Enter.The group policy will be updated.

5.2. Define Log On As A Batch Job PolicyOn Managed Object creation, the Log on as a batch job policy is automatically defined for the DataProcessing Account as a local security policy. However, if you have theDeny log on as a batch job policydefined locally or on the domain level, the local Log on as a batch job policy will be reset. In this case,redefine the Deny log on as a batch job policy through the Local Security Policy console on yourcomputer or on the domain level through theGroup Policy Management console.

1. On the computer where Netwrix Auditor is installed, open the Local Security Policy snap-in:navigate to Start → All Programs → Administrative Tools and select Local Security Policy.

2. Navigate to Security Settings → Local Policies → User Rights Assignment and locate the Log onas a batch job policy.

85/104

Page 86: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

3. Double-click the Log on as a batch job policy, and click Add User or Group. Specify the accountthat you want to define this policy for.

5.3. Define Log On As A Service PolicyOn the SharePoint Managed Object creation, the Log on as a service policy is automatically defined forthe Data Processing Account as a local security policy. However, if you have theDeny log on as a servicepolicy defined locally or on the domain level, the local Log on as a service policy will be reset. In this case,redefine the Deny log on as a service policy through the Local Security Policy console on yourcomputer or on the domain level through theGroup Policy Management console.

1. On the computer where Netwrix Auditor is installed, open the Local Security Policy snap-in:navigate to Start → All Programs → Administrative Tools and select Local Security Policy.

2. Navigate to Security Settings → Local Policies → User Rights Assignment and locate the Log onas a service policy.

3. Double-click the Log on as a service policy, and click Add User or Group. Specify the account thatyou want to define this policy for.

5.4. Assign Database Owner Role (db_owner)1. On the computer where SQL Server with the audit database is installed, navigate to Start → All

Programs → Microsoft SQL Server → SQL Server Management Studio.

2. Connect to the server.

3. In the left pane, expand the Security node. Right-click the Logins node and select New Login fromthe pop-up menu.

86/104

Page 87: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

4. Click Search next to Login Name and specify the user that you want to assign the db_owner role to.

5. If you are assigning the db_owner role to the Data Processing Account, make sure theWindowsauthentication option is selected. If this is a different account, select SQL Server authentication.

6. Select Server roles on the left and assign the sysadmin role to the new login: all members of thisrole have the db_owner role by default. If you do not want to assign the sysadmin role to this user,select public as server role.

7. Select theUser Mapping tab. Select the database used by Netwrix Auditor to store audit data in theupper pane and check db_owner in the lower pane.

NOTE: If the account that you want to assign the db_owner role to has been already added to SQLServer Logins, expand the Security → Logins node, right-click the account, select Propertiesfrom the pop-up menu, and edit its roles.

87/104

Page 88: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

5.5. Assign System Administrator Role1. On the computer where SQL Server with the audit database is installed, navigate to Start → All

Programs → Microsoft SQL Server → SQL Server Management Studio.

2. Connect to the server.

3. In the left pane, expand the Security node. Right-click the Logins node and select New Login fromthe pop-up menu.

88/104

Page 89: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

4. Click Search next to Login Name and specify the user that you want to assign the sysadmin role to.

5. Specify the Server roles tab and assign the sysadmin role to the new login.

5.6. Grant Permissions for AD Deleted ObjectsContainer

NOTE: Perform this procedure only if the Data Processing Account does not belong to theDomainAdmins group.

1. Log on to any domain controller in the target domain with a user account that is a member of theDomain Admins group.

2. Navigate to Start → Run and type "cmd".

3. Input the following command: dsacls <deleted_object_dn> /takeownership

where deleted_object_dn is the distinguished name of the deleted directory object.

For example: dsacls "CN=Deleted Objects,DC=Corp,DC=local" /takeownership

4. To grant permission to view objects in the Deleted Objects container to a user or a group, type thefollowing command: dsacls <deleted_object_dn> /G <user_or_group>:<Permissions>

89/104

Page 90: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

where deleted_object_dn is the distinguished name of the deleted directory object and user_

or_group is the user or group for whom the permission applies, and Permissions is thepermission to grant.

For example, dsacls "CN=Deleted Objects,DC=Corp,DC=local" /G Corp\jsmith:LCRP

In this example, the user CORP\jsmith has been granted List Contents and Read Propertypermissions for theDeleted Objects container in the corp.local domain. These permissions let thisuser view the contents of theDeleted Objects container, but do not let this user make any changesto objects in this container. These permissions are equivalent to the default permissions that aregranted to theDomain Admins group.

5.7. Assign Permissions To Registry Key

NOTE: Perform this procedure only if the Data Processing Account does not belong to theDomainAdmins group. This procedure must be performed on each domain controller in the auditeddomain. If your domain contains multiple domain controllers, you may prefer a different method,for example assigning permissions through Group Policy.

1. On your target server, open Registry Editor: navigate to Start → Run and type "regedit".

2. In the left pane, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Security. Right-click the Security node and select Permissions from the pop-upmenu.

3. Click Add and enter the name of the user that you want to grant permissions to.

4. Check Allow next to theRead permission.

5.8. Add Account to Organization Management Group1. Navigate to Start → Active Directory Users and Computers on any domain controller in the root

domain of the forest where Microsoft Exchange Server 2010 or 2013 is installed,.

2. In the left pane, navigate to <domain_name> → Microsoft Exchange Security Groups.

3. On the right, locate theOrganization Management group and double-click it.

4. In theOrganization Management Properties dialog that opens, select theMembers tab and clickAdd.

90/104

Page 91: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

NOTE: If for some reason you do not want this account to belong to theOrganizationManagement group, you can add it to the Records Management group in the same way.The Records Management group is less powerful, and accounts belonging to it have fewerrights and permissions.

5.9. Assign Audit Logs Role To Account

NOTE: Perform this procedure only if you do not want to add the Data Processing Account to theOrganization Management or theRecords Management group.

1. On the computer where Microsoft Exchange Server 2010 or 2013 is installed, open the ExchangeManagement Shell under an account that belongs to theOrganization Management group.

2. Use the following syntax to assign theAudit Log role to a user:

New-ManagementRoleAssignment -Name <assignment name> -User <UserName> -Role<role name>

For example:

New-ManagementRoleAssignment -Name "AuditLogsNetwrixRole" -User Corp\jsmith-Role "Audit Logs"

In this example, the user CORP\jsmith has been assigned theAudit Logs role.

5.10. Assign Content Manager Role To AccountFor proper performance of the Reports functionality, the account used to view reports, as well as theaccount used to run the product scheduled task, must be assigned the Content Manager role for the SSRSHome folder.

1. Start Report Manager, open the Properties tab of the Home folder and click New RoleAssignment (the path can slightly vary depending on your SQL Server version).

91/104

Page 92: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

5. Configure Data Processing Account Rights and Permissions

2. Specify the necessary group or user account in the following format: domain\user. The account mustbelong to the same domain, or to a trusted domain.

3. Select Content Manager.

5.11. Assign SharePoint_Shell_Access RoleThe account that runs Netwrix Auditor Agent for SharePoint installation must be granted the SharePoint_Shell_Access role on SharePoint SQL Server configuration database. If you select to deploy the agentautomatically on the Create New Managed Object wizard completion, the installation will be performedunder the Data Processing Account.

1. In your SharePoint server, click Start → Microsoft SharePoint Products <version> SharePointManagement Shell.

2. Execute the following command:

Add-SPShellAdmin –UserName <domain\user>

92/104

Page 93: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

6. Upgrade From Previous Versions

6. Upgrade From Previous VersionsYou can upgrade your current Netwrix Auditor version to Netwrix Auditor 6.5. All your current settings willbe preserved and no reconfiguration is required.

NOTE: The upgrade is supported starting with Netwrix Auditor 5.0.x.

To upgrade to Netwrix Auditor 6.5

1. Download Netwrix Auditor 6.5.

2. Open the Netwrix Auditor console. Navigate to each Managed Object, in the right pane make surethat the data collection for each of the audited systems is not Running. If the data collection task isin progress, wait until it completes.

3. On each audited system page under each Managed Object individually, clear the Enable checkbox todisable audit.

4. Close all Netwrix Auditor windows.

5. Run the installation package.

6. Click Install.

7. Follow the instructions of the setup wizard.

NOTE: When upgrading from Netwrix Auditor 5.0.80 and below, do not change the programinstallation path on the Installation Folder step of the wizard, otherwise your currentconfiguration may be lost.

8. Netwrix Auditor shortcuts will be added to the Start menu and the Netwrix Auditor console will open.

93/104

Page 94: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

7. Uninstall Netwrix Auditor

7. Uninstall Netwrix Auditor

7.1. Uninstall Agents

NOTE: Perform the procedures below if you used agents for data collection (i.e. theUse LightweightAgents option was enabled).

Some agents are stopped but not removed during Netwrix Auditor uninstallation. You need to delete themmanually prior to Netwrix Auditor uninstallation.

Perform the following procedures to uninstall the Netwrix Auditor agents:

l To delete Netwrix Auditor agents used auditing Active Directory

l To delete Netwrix Auditor agents used for auditing file servers

l To delete Netwrix Auditor agents used for auditing Windows Server

l To delete Netwrix Auditor agents used for tracking privileged user session activity

l To delete Netwrix Auditor agents used for auditing mailbox access on Exchange

l To delete Netwrix Auditor Agent for SharePoint

To delete Netwrix Auditor agents used auditing Active Directory

1. On the computer where Netwrix Auditor is installed, navigate to Start → Run and type "cmd".

2. Execute the following command:

%Netwrix_ Auditor_ installation_ folder%\Active Directory Auditing\adcr.exe/removeagents domain=<domain name>

where <domain name> is the name of the monitored domain in the FQDN format.

Example:

C:\Program Files\Netwrix\Active Directory Auditing\adcr.exe /removeagentsdomain=domain.local

3. To delete agents from a specific domain controller, execute the following command:

%Netwrix_ Auditor_ installation_ folder%\Active Directory Auditing\adcr.exe/removeagents dс=<domain controller name>

To delete Netwrix Auditor agents used for auditing file servers

NOTE: Perform this procedure only if you used agents for data collection.

1. On the target servers, navigate to Start → Control Panel → Programs and Features.

2. Select Netwrix Auditor Agent for File Servers and click Uninstall.

94/104

Page 95: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

7. Uninstall Netwrix Auditor

To delete Netwrix Auditor agents used for auditing Windows Server

NOTE: Perform this procedure only if you used agents for data collection.

1. On the target servers, navigate to Start → Control Panel → Programs and Features.

2. Select Netwrix Windows Server Change Reporter Agent Enterprise Edition and click Uninstall.

To delete Netwrix Auditor agents used for tracking privileged user session activity

l Remove agents via the Netwrix Auditor console:

1. In the Netwrix Auditor console, navigate to Managed Objects → your_Managed_Object_name in the left pane.

2. In the right pane select the Items tab.

3. Select a computer in the list and click Remove. The agent will be deleted from the selectedcomputer. Perform this action with other computers.

4. In the left pane navigate to Managed Objects → your_Managed_Object_name → UserActivity → Monitored Computers. Make sure that the computers you have removed fromauditing are no longer present in the list.

5. In case some computers are still present in the list, select them one by one and click RetryUninstallation. If this does not help, remove the agents manually from the target computersthrough Programs and Features.

l Remove agents manually on each audited computer:

1. Navigate to Start → Control Panel → Programs and Features.

2. Select Netwrix User Activity Video Reporter Agent and click Uninstall.

To delete Netwrix Auditor agents used for auditing mailbox access on Exchange

1. On every computer where a monitored Exchange Server is installed, navigate to Start → Run andtype "cmd".

2. Execute the following command:

sc delete “Netwrix Non-owner Mailbox Access Agent”

3. Remove the following folder: %SYSTEMROOT%\Netwrix\Netwrix Non-owner Mailbox Access Agent.

To delete Netwrix Auditor Agent for SharePoint

NOTE: During the agent installation / uninstallation your SharePoint sites may be unavailable.

1. In the audited SharePoint farm, navigate to the computer where Central Administration is installedand where the agent resides.

2. Navigate to Start → Control Panel → Programs and Features.

95/104

Page 96: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

7. Uninstall Netwrix Auditor

3. Select Netwrix Auditor Agent for SharePoint and click Uninstall.

NOTE: Once you click Uninstall you cannot cancel the agent uninstallation. The agent will beuninstalled even if you click Cancel.

7.2. Uninstall Netwrix Auditor

NOTE: If you enabled agents for data collection, make sure to stop them before uninstalling the product.Some agents must be removed manually. See Uninstall Agents for more information.

To uninstall Netwrix Auditor

1. On the computer where Netwrix Auditor is installed, navigate to Start → Control Panel →Programs and Features.

2. Select the Netwrix Auditor features one by one and click Uninstall.

96/104

Page 97: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

8. Appendix

8. AppendixThis section contains instructions on how to install the third-party components that are not included in theNetwrix Auditor installation package, but are required for the product to function properly.

Refer to the following sections for step-by-step instructions on how to:

l Install Group Policy Management Console

l Install ADSI Edit

l Install Microsoft SQL Server

8.1. Install Group Policy Management ConsoleGroup Policy Management Console is an administrative tool for managing Group Policy across theenterprise. If you want to audit Group Policy, Group Policy Management Console must be installed on thecomputer where Netwrix Auditor is deployed.

To install GPMC on Windows Server 2008 and Windows Server 2008 R2

1. Navigate to Start → Control Panel → Programs and Features → Turn Windows features on oroff.

2. In the Server Manager dialog, select Features in the left pane, click Add Features and select GroupPolicy Management.

3. Click Install to enable it.

To install GPMC on Windows Server 2012 and above

1. Navigate to Start → Control Panel → Programs and Features → Turn Windows features on oroff.

2. In the Server Manager dialog, select Features in the left pane, select Group Policy Management.

3. Click Next to proceed to confirmation page.

4. Click Install to enable it.

To install GPMC on Windows 7

1. Download and install Remote Server Administration Tools that include Group Policy ManagementConsole.

2. Navigate to Start → Control Panel → Programs and Features → Turn Windows features on or

97/104

Page 98: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

8. Appendix

off.

3. Navigate to Remote Server Administration Tools → Feature Administration Tools and selectGroup Policy Management Tools.

4. Click Install.

To install GPMC on Windows 8

1. Download and install Remote Server Administrator Tools that include Group Policy ManagementConsole.

2. Navigate to Start → Control Panel → Programs and Features → Turn Windows features on oroff.

3. Navigate to Remote Server Administration Tools → Feature Administration Tools and selectGroup Policy Management Tools.

To install GPMC on Windows 8.1

1. Download and install Remote Server Administrator Tools that include Group Policy ManagementConsole.

2. Navigate to Start → Control Panel → Programs and Features → Turn Windows features on oroff.

3. Navigate to Remote Server Administration Tools → Feature Administration Tools and selectGroup Policy Management Tools.

8.2. Install ADSI EditThe ADSI Edit utility is used to view and manage objects and attributes in an Active Directory forest. ADSIEdit is required to manually configure audit settings in the target domain. It must be installed on anydomain controller in the domain you want to start auditing.

To install ADSI Edit on Windows Server 2008 and Windows Server 2008 R2

1. Navigate to Start → Control Panel → Programs → Programs and Features → Turn Windowsfeatures on or off.

2. In the Server Manager dialog, select Features in the left pane, click Add Features.

3. Navigate to Remote Server Administration Tools → Role Administration Tools and select AD DSand AD LDS Tools .

4. Click Next to proceed to the confirmation page.

5. Click Install to enable it.

98/104

Page 99: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

8. Appendix

To install ADSI Edit on Windows Server 2012 and above

1. Navigate to Start → Control Panel → Programs → Programs and Features → Turn Windowsfeatures on or off.

2. In the Server Manager dialog, select Features in the left pane.

3. Navigate to Remote Server Administration Tools → Role Administration Tools and select AD DSand AD LDS Tools.

4. Click Next to proceed to the confirmation page.

5. Click Install to enable it.

To install ADSI Edit on Windows 7

1. Download and install Remote Server Administration Tools that include ADSI Edit.

2. Navigate to Start → Control Panel → Programs → Programs and Features → Turn Windowsfeatures on or off.

3. Navigate to Remote Server Administration Tools → Role Administration Tools and select AD DSand AD LDS Tools.

4. Click OK.

To install ADSI Edit on Windows 8 and above

1. Download and install Remote Server Administration Tools.

2. Navigate to Start → Control Panel → Programs → Programs and Features → Turn Windowsfeatures on or off.

3. Navigate to Remote Server Administration Tools → Role Administration Tools and select ADDS and AD LDS Tools.

4. Click OK.

To install GPMC on Windows 8.1

1. Download and install Remote Server Administrator Tools that include Group Policy ManagementConsole.

2. Navigate to Start → Control Panel → Programs and Features → Turn Windows features on oroff.

3. Navigate to Remote Server Administration Tools → Role Administration Tools and select ADDS and AD LDS Tools.

4. Click OK.

99/104

Page 100: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

8. Appendix

8.3. Install Microsoft SQL ServerThis section provides instructions on how to:

l Install Microsoft SQL Server 2008 R2 Express or 2012 Express

l Verify Reporting Services Installation

8.3.1. Install Microsoft SQL Server 2008 R2 Express or 2012Express

NOTE: This section only provides instructions on how to install SQL Server with Advanced Services andconfigure the Reporting Services required for Netwrix Auditor to function properly. For fullinstallation and configuration instructions, refer to Microsoft documentation.

1. Download one of the following:

l SQL Server 2008 R2

l SQL Server 2012

2. Run the installation package and follow the instructions of the wizard until you get to the FeatureSelection page. On this page, ensure that theReporting Services option is selected under InstanceFeatures.

3. Proceed with the wizard until you get to the Server Configuration page. On this page, ensure thatthe SQL Server Reporting Services will run under the Network Service account, and its startuptype is set to "Automatic".

4. Follow the instructions of the wizard to complete the installation.

8.3.2. Verify Reporting Services InstallationAs a rule, Netwrix Auditor can use Reporting Services installed with the default settings. However, toensure that Reporting Services are properly configured, it is recommended to perform the followingprocedure:

NOTE: You must be logged in as a member of the local administrators group on the computer where SQLServer 2008 R2 or 2012 Express is installed.

1. Depending on SQL Server version installed, navigate to:

l Start → All Programs → Microsoft SQL Server 2008 R2 → Configuration Tools →Reporting Services Configuration Manager

l Start → All Programs → Microsoft SQL Server 2012 → Configuration Tools → ReportingServices Configuration Manager

100/104

Page 101: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

8. Appendix

2. In theReporting Services Configuration Connection dialog, make sure that your local report serverinstance (for example SQLExpress) is selected and click Connect.

3. In the Reporting Services Configuration Manager left pane, select Web Service URL. Make surethat Virtual Directory is set to "ReportServer_ <YourSqlServerInstanceName>" (for exampleReportServer_SQLEXPRESS for SQLEXPRESS instance) and TCP Port is set to "80".

4. In the Reporting Services Configuration Manager left pane, select Database. Make sure that theSQL Server Name and Database Name fields contain correct values. If the fields contain incorrectvalues, click Change Database and complete theReport Server Database Configurationwizard.

5. In theReporting Services Configuration Manager left pane, select Report Manager URL. Makesure Virtual Directory is set correctly, and that the URL is valid.

101/104

Page 102: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

Index

IndexA

Active Directory

Active Directory Audit Configurationwizard 24

Audit settings 28

Auto archiving 32

Domain audit policies 28

Objec-level auditing for Configurationand Schema partitions 36

Objec-level auditing for Domainpartition 33

Retention period for backup logs 32

Security event log size and retentionmethod 30

Tombstone lifetime 39

Rights and permissions 79

ADSI Edit 98

Agents 15

Manually install for SharePoint 16

Manually install for tracking user'sactivity 16

Uninstall 94

Audit, configure 18

Audited IT Infrastructure 8

C

Configure Audit 18

Active Directory 28

Active Directory Audit Configurationwizard 24

EMC appliances 41

Event logs on Syslog-based platforms 47

Event logs on Windows Servers 45

Exchange Server 47

Group Policy 49

Mailbox Access 49

NetApp Filer appliances 51

Priviled user session activity 55

SharePoint 60

Windows file servers 61

Windows Server 72

D

Data Processing Account 79

Audit Logs role 91

Content Manager role 91

DB owner role 86

Deleted Objects Container 89

Log on as a batch job 85

Log on as a service 86

Manage auditing and security log policy 85

Organizational Management group 90

Registry key 90

SharePoint_Shell_Access 92

Sysadmin role 88

Deployment options 11

E

EMC appliances

Audit settings 41

CIFS file shares 41

Security event log max size 41

102/104

Page 103: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

Index

Rights and permissions 79

Environment 8

Event Logs

Audit settings

Configure Syslog daemon (Red Hat) 47

Configure Syslog daemon (Ubuntu) 47

Enable Remote Registry 45

Rights and permissions 80

Exchange Server

Audit Configuration wizard 24

Audit settings 47

AAL 48

Rights and permissions 80

G

GPMC 97

Group Policy

Audit settings 49

Rights and permissions 81

Group Policy Management Console 97

I

Inactive Users in Active Directory

Rights and permissions 81

Install

ADSI Edit 98

Agent for SharePoint 16

Agent for tracking user's activity 16

Deployment options 11

GPMC 97

Netwrix Auditor 8, 14

SQL Server 100

M

Mailbox Access

Audit settings 49

Rights and permissions 82

N

NetApp Filer

Audit settings 51

Admin web access 52

CIFS file shares 54

Event categories 52

Qtree security 51

Rights and permissions 81

O

Overview 6

P

Password Expiration in Active Directory

Rights and permissions 82

Privileged user session activity

Account rights and permissions 82

Audit settings

Firewall settings 56

Start Windows services 55-56

Permissions to watch videos 58

Add to group 59

Enable JavaScript 59

IE ESC 59

S

SharePoint

Audit settings 60

Install agent 16

103/104

Page 104: Netwrix Auditor Installation Configuration Guide

Netwrix Auditor Installation and Configuration Guide

Index

Rights and permissions 82

SQL Server

Rights and permissions 83

Supported SQL Server versions 12

System requirements 8

U

Uninstall

Agents 94

Netwrix Auditor 96

Upgrade 93

V

VMware

Rights and permissions 83

W

Windows file servers

Audit settings

Advanced audit policy 67

Audit object access policy 65

Event log size 70

Object-level auditing 62

Remote registry service 71

Rights and permissions 83

Windows Server

Audit settings

Event log size and retention 77

Local audit policies 75

Remote registry service 72

Windows registry 73

Rights and permissions 84

104/104