19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.150 Auditing of Novell Netware 4.x networks<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Auditors<br />

One important technique of ensuring the security of a network is to allow<br />

independent auditors to check the events taking place in a network. For this<br />

purpose, Netware 4.x allows a large number of events to be tracked in the<br />

NDS and the file system through activation of an auditing function with the<br />

utility program named SYS:PUBLIC\AUD<strong>IT</strong>CON.EXE. Netware 4.x permits<br />

any required number of users to be assigned the role of an auditor. This<br />

program offers the following functions, among others:<br />

- Auditors can monitor all NDS file events on the Netware server, in the<br />

containers, or on a particular volume.<br />

- Auditing of the file system can be activated on the volume and container<br />

levels.<br />

- Auditors can trace network events and activities, but except for the auditing<br />

data and auditing log files, they can only open or edit files for which they<br />

have been granted access rights by the administrator.<br />

Note: If the logging function is activated, the log file can become very large.<br />

For this reason, a limit should be imposed on the maximum size of the file in<br />

order to prevent a shortage of memory. As the maximum size depends on the<br />

number of users and the activities they perform however, no fixed values can<br />

be specified here.<br />

<strong>The</strong> data accumulated in this process is usually related to persons, and thus<br />

subject to the Federal Data Privacy Act. <strong>The</strong>se data must only be used so as to<br />

ensure data privacy, maintain data backups and guarantee correct operation<br />

(also refer to S 2.110 Data privacy guidelines for logging procedures).<br />

To configure an independent auditor who can check the activities of an<br />

administrator, but possesses no other administrative rights in the network, the<br />

following steps must be taken:<br />

- In the case of Netware 4.10, the auditing for the file system and for the<br />

NDS must be activated and a password must be assigned. Anyone who<br />

knows this password is able to evaluate the audited data. Under Netware<br />

4.10, therefore, great care must be taken to ensure that no unauthorised<br />

persons obtain this password. No further allocation of rights is required<br />

under Netware 4.10.<br />

In Netware version 4.11 and higher, the information is stored in the NDS<br />

audit file objects. This considerably improves the security. In addition,<br />

there is much more scope for monitoring under Netware 4.11, as the<br />

number of auditing mechanisms and functions has been substantially<br />

increased.<br />

- Create a user object for the auditor. <strong>The</strong> authorisation should not be<br />

granted for a conventional user account, as this could destroy the security.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!