Windows Server
In this tutorial, we'll walk you through essential techniques to enhance the performance, security, and reliability of your Windows Server environment.
Before we delve into the specifics of file server monitoring, it's crucial to establish a strong foundation within your Windows Server setup. This includes configuring loggin g settings and seamlessly integrating them with your monitoring system, ensuring a streamlined monitoring process.
Throughout this guide, we'll focus on practical strategies designed to monitor your Windows Server effectively. By implementing these techniques, you'll be better equipped to identify potential security risks, track file access activities, and maintain the integrity of your data stored on Windows Server.
Auditing Windows Server using EventLog Analyzer
EventLog Analyzer covers the below Windows Server auditing use cases with its security auditing reports. These reports are predefined and can be scheduled to be generated at specific time and distributed over email.
| Windows and Windows workstation | ||||
|---|---|---|---|---|
| Use Case | Description | Why implement? | Available Reports | |
| Identify long-term trends | The log trend report aggregates the events generated by the Windows Server to provide an overview of the log flow and events over a time. EventLog Analyzer provides weekly and hourly trend reports by default. |
|
|
|
| Resolve boot-related errors | Windows Startup Events are log entries recorded during the system boot process, capturing crucial information about system and application initialization to diagnose startup issues and optimize performance. | Unexpected shutdowns and restarts on critical Windows Servers can cause downtime and data loss. EventLog Analyzer monitors boot events, detects issues like BSOD and kernel power failures, and sends real-time alerts for prompt action. |
|
|
| Monitor registry changes | Windows registry changes involve modifying the hierarchical database that stores configuration settings and options for the Windows operating system and installed applications. | Optimize system performance, customize user experiences, and troubleshoot or fix system issues by adjusting specific settings not available through the standard user interface. |
|
|
| Audit service configurations and access | A service audit is a monitoring mechanism that tracks service activities, configurations, and access on Windows systems. | Service audits enhance security by tracking service activities and supporting compliance. Monitoring critical services is vital, as sudden stoppages can disrupt business and cause downtime. |
|
|
| Data recovery readiness | Windows Backup and Restore is a built-in feature in Windows OS for creating backups of files and system images, ensuring data integrity and recovery in case of hardware failure or data loss. | Implementing it safeguards against data loss from deletions, crashes, or malware, enabling quick restoration. A successful system restore validates backup effectiveness and recovery readiness. |
|
|
| Maintain software compliance | A systematic record of all software installed on Windows systems, detailing versions, licenses, and dependencies. | Ensures compliance with licensing agreements, facilitates security patch management, and optimizes resource allocation. |
|
|
| Application execution | Application allowlisting restricts executable files to an approved list, enhancing security by preventing unauthorized software execution. | Implementing it reduces malware risks and enforces control over software installation and execution. |
|
|
| Malware alerts in real time | Threat detection from antivirus involves real-time monitoring and analysis of system activities to identify and mitigate malware, suspicious behaviors, and vulnerabilities. | Implementing it enhances cybersecurity by proactively detecting and neutralizing threats, safeguarding data integrity, and maintaining system performance. |
|
|
| Analyze application instability | Windows Application Crashes refer to unexpected terminations of software due to issues like memory leaks or coding errors, disrupting user experience and system stability. | Implementing crash monitoring helps diagnose root causes swiftly, enhancing software reliability and minimizing user frustration and downtime. |
|
|
Security use cases
| Use Case | Event type | MITRE TTPs | Rules |
|---|---|---|---|
| Removable media detected | Removable media detected |
|
|
| Windows abnormal shutdown | Unexpected shutdown |
|
|
| Windows Service Stop-Restart | Service control event |
|
|
| Windows Security Log is full | System alert |
|
|
| Interactive use of service account | Windows activity |
|
|
| Brute force attempt from the same source | Brute force attack |
|
|
| Detection of system time changes (Boot time) | Windows time change |
|
|
| Audit Log cleared | Audit log cleared |
|
|
| Windows Hardware Failure | Disk error |
|
|
| Administrative Accounts- Multiple Login failure | Multiple login failure detected |
|
|
| Multiple Windows Accounts are Locked out | Account lockout |
|
|
| Unauthorized data exfiltration through removable media. | Removable media activity |
|
|
| Detect potential security breaches | Network security logs |
|
|
Compliance use case
| Reports | Regulation | Requirements |
|---|---|---|
|
FISMA | Access Control (AC) |
| PCI-DSS |
|
|
| SOX | SEC 302 (a) (4) (C) | |
| HIPAA |
|
|
| GLBA | Section 501B (2) & (3) | |
| ISO 27001: 2013 | Control A 12.4.3 | |
| GPG | Recording Relating to Network Connections (PMC Rule 6) | |
| ISLP |
|
|
| GDPR |
|
|
| NRC |
|
|
| NERC |
|
|
| PDPA |
|
|
| NIST CSF | Data Security (PR.DS) | |
| POPIA |
|
|
| QCF | 5.2.2 Network Access Control Management Service | |
| TISAX | 5.2.4 | |
| ECC |
|
|
| PDPL |
|
|
|
FISMA | Certification, Accreditation, and Security Assessments (CA) |
| NRC | ACT B.3.11 | |
| Cyber essentials | Patch Management | |
| COCO |
|
|
| NERC |
|
|
|
FISMA | Contingency Planning (CP) |
| GPG | Recording on Data Backup Status(PMC Rule 8) | |
| ISLP |
|
|
| NERC | CIP 009-6 R1.4 | |
| TISAX | 5.2.4 | |
|
FISMA | Identification and Authentication (IA) |
| PCI-DSS |
|
|
| SOX | SEC 302 (a) (5) (B) | |
| ISO 27001: 2013 |
|
|
| ISLP |
|
|
| GDPR |
|
|
| NRC |
|
|
| Cyber essentials |
|
|
| NERC |
|
|
| PDPA |
|
|
| NIST CSF | Data Security (PR.DS) | |
| QCF |
|
|
| TISAX |
|
|
| SAMA |
|
|
| UAE-NESA | T3.2.1 | |
| SOC 2 |
|
|
| Windows Software Updates | FISMA | Configuration Management (CM) |
| NRC | ACT C.11.4 | |
| Cyber essentials | Malware Protection | |
| NERC |
|
|
|
PCI-DSS |
|
| GPG | Recording on Internal Workstation, Server or Device Status (PMC Rule 4) | |
|
PCI-DSS | PCI-DSS requirements 10.2.3 |
| Cyber essentials | Secure Configuration | |
| COCO | 1.C.Physical Security | |
| NERC |
|
|
| QCF | 5.7.3 Management module | |
| TISAX | 4.2.15.2.7 | |
| SAMA |
|
|
| PDPL |
|
|
| UAE-NESA | T3.2.1 | |
|
PCI-DSS | PCI-DSS requirements 10.2.6 |
| SOX | SEC 302 (a) (4) (A) | |
| HIPAA | 164.308 (a) (7) (i) | |
| GLBA | Section 501B (1) | |
| ISO 27001: 2013 | Control A 12.4.2 | |
| NRC |
|
|
| Cyber essentials | Patch Management | |
| COCO |
|
|
| NERC |
|
|
| CMMC |
|
|
| POPIA | Chapter 3 - Section 22 (5) (a) | |
| QCF |
|
|
| TISAX | 5.2.4 | |
| SAMA |
|
|
| ECC | 2-12 Cybersecurity Event Logs and Monitoring Management | |
| UAE-NESA |
|
|
| SOC 2 |
|
|
|
GPG | Reporting on The Status of The Audit System (PMC Rule 10) |
| Cyber essentials | Malware Protection | |
| COCO | 3.Boundary Protection and Interfaces | |
| POPIA |
|
|
| QCF |
|
|
| SAMA |
|
|
| UAE-NESA | T3.4.1 | |
| SOC 2 |
|
|
|
NRC | ACT B.1.17 |
| PDPA |
|
|
| NIST CSF | Data Security (PR.DS) | |
| QCF |
|
|
| TISAX | 5.2.7 | |
| SAMA | 3.2.1.3 Cyber Security Risk Response | |
| PDPL |
|
|
| Windows Removable Disk Auditing USB Plugged In USB Plugged Out Removable Disk Reads Removable Disk Failed Reads Removable Disk Failed Creates Removable Disk Modifications Removable Disk Failed Modifications Removable Disk Deletes Removable Disk Failed Deletes Device Based Removable Disk Changes Removable Disk Creates | NRC | ACT B.1.19 |
| Cyber essentials | Malware Protection | |
| CCPA and CPRA | Section 1798.150.(a) | |
| FERPA | Section 99.31 (a)(1)(ii) | |
| PDPA |
|
|
| NIST CSF | Data Security (PR.DS) | |
| SAMA |
|
|
| ECC | 2-8 Cryptography | |
| PDPL |
|
|
| UAE-NESA |
|
|
| LGPD | Art 14 | |
|
Cyber essentials | Malware Protection |
| COCO | 1.D.Protective monitoring and intrusion detection | |
| NERC | CIP 007-6 R3.1 | |
| NIST CSF | Risk Assessment (ID.RA) | |
| POPIA | Chapter 3 - Section 19 (2) (a) | |
| QCF |
|
|
| PDPL |
|
|
|
Cyber essentials | Malware Protection |
| NERC |
|
|
| PDPL |
|
|
| UAE-NESA | T3.4.1 | |
|
Cyber essentials | Boundary firewalls and internet gateways |
|
COCO | 1.B.Secure Configuration |
| TISAX | 5.2.45.2.7 | |
|
COCO | 1.B.Secure Configuration |
|
NERC |
|
| UAE-NESA | T3.4.1 | |
|
CMMC |
|
| QCF | 5.8.6.2 Network domain security IP core | |
| TISAX |
|
|
| SAMA |
|
|
| ECC | 2-2 Identity and Access Management | |
| CJDN | Logging | |
| UAE-NESA |
|
|
| SOC 2 |
|
|
| LGPD |
|
|
| Windows Logoff ReportsWindows Successful User LogoffsUser Initiated LogoffsInteractive LogoffsRemote Interactive LogoffsNetwork Logoff | CMMC | C001 - AC.1.001 |
| POPIA |
|
|
| QCF | 5.8.6.2 Network domain security IP core | |
| TISAX |
|
|
| SAMA |
|
|
| ECC |
|
|
| PDPL |
|
|
| CJDN | Logging | |
| UAE-NESA | T7.5.3 | |
| SOC 2 |
|
|
| LGPD | Art 16 | |
|
CMMC | C001 - AC.1.001 |
| SAMA |
|
|
| POPIA |
|
|
| QCF | 5.8.6.2 Network domain security IP core | |
| TISAX |
|
|
| ECC |
|
|
| PDPL |
|
|
| CJDN | Logging | |
| UAE-NESA | T7.5.3 | |
| SOC 2 |
|
|
| LGPD | Art 16 | |
|
CMMC |
|
| POPIA |
|
|
| TISAX | 5.2.4 | |
| SAMA |
|
|
| ECC | 2-8 Cryptography | |
| LGPD | Art 16 | |
|
CMMC |
|
| TISAX | 5.2.4 | |
| SOC 2 |
|
|
| Windows Threat DetectionAudit Events DroppedSecurity Log Full | CMMC |
|
| TISAX | 5.2.4 | |
|
CMMC |
|
| TISAX | 5.2.4 | |
| SOC 2 |
|
|
|
CMMC | C041 - SI.5.222 |
| QCF | 5.2.1 Network Configuration Management Service | |
| TISAX | 5.2.4 | |
|
CMMC | C041 - SI.5.222 |
| SAMA |
|
|
| UAE-NESA | T3.4.1 |










