19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

It should be noted that accesses to the registry are only recorded if the auditing<br />

of file and object accesses is activated in the General Audit Policy.<br />

When access to the registry is monitored, a large amount of auditing data is<br />

generated which must also be evaluated. Furthermore, recording these events<br />

usually has a negative effect on the system performance. In some cases, taking<br />

the security requirements into account, the following alternative procedure is<br />

recommended. Rejected attempts to access the keys<br />

HKEY_LOCAL_MACHINE and HKEY_USERS, are recorded as described<br />

above. Successful accesses to these keys are not recorded. Rather, a suitable<br />

integrity protection program is used. In this way, changes to these keys are<br />

easily recognised. However, the disadvantage of this method is that the<br />

program does not recognise who has made the changes.<br />

By stipulating appropriate specifications with the utility Event display, the log<br />

file should be created to be so large that all entries occurring within a specified<br />

period (for example, in one week) can be stored reliably. When doing this,<br />

provision should be made for a security margin, so that in general a maximum<br />

of around 30% of the log file is filled. After the specified period has elapsed,<br />

each log file should be analysed, filed and then cleared to create space for new<br />

entries.<br />

In order to avoid system failures as a result of fully writing the log file, under<br />

normal circumstances one of the options "Overwrite events as needed" or<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!