11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Securing Your <strong>Web</strong> Server 451Step 10. Auditing <strong>and</strong> LoggingAuditing does not prevent system attacks, although it is an important aid inidentifying intruders <strong>and</strong> attacks in progress, <strong>and</strong> can assist you in diagnosing attackfootprints. Enable a minimum level of auditing on your <strong>Web</strong> server <strong>and</strong> use NTFSpermissions to protect the log files so that an attacker cannot cover his tracks bydeleting or updating the log files in any way. Use IIS W3C Extended Log File FormatAuditing.During this step, you:● Log all failed Logon attempts.●●●●Log all failed actions across the file system.Relocate <strong>and</strong> secure the IIS log files.Archive log files for offline analysis.Audit access to the Metabase.bin file.Log All Failed Logon AttemptsYou must log failed logon attempts to be able to detect <strong>and</strong> trace suspicious behavior. To audit failed logon attempts1. Start the Local <strong>Security</strong> Policy tool from the Administrative Tools program group.2. Exp<strong>and</strong> Local Policies <strong>and</strong> then select Audit Policy3. Double-click Audit account logon events.4. Click Failure <strong>and</strong> then OK.Logon failures are recorded as events in the Windows security event log. Thefollowing event IDs are suspicious:● 531. This means an attempt was made to log on using a disabled account.●529. This means an attempt was made to log on using an unknown user account orusing a valid user account but with an invalid password. An unexpected increasein the number of these audit events might indicate an attempt to guess passwords.Log All Failed Actions Across the File SystemUse NTFS auditing on the file system to detect potentially malicious attempts. This isa two-step process. To enable logging1. Start the Local <strong>Security</strong> Policy tool from the Administrative Tools program group.2. Exp<strong>and</strong> Local Policies <strong>and</strong> then select Audit Policy3. Double-click Audit object access.4. Click Failure <strong>and</strong> then click OK.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!