Implement Auditing using Windows PowerShell

Implement Auditing using Windows PowerShell

We can implement auditing using Windows PowerShell with the Get-Acl and Set-Acl cmdlets. These allow us to view and modify the auditing options of a file or folder in Windows. While this can also be done through the graphical user interface, using PowerShell allows us to script such actions, as well as some extra functionality such as copying the auditing settings from one object to another.

Read more »

Enable and configure Module, Script Block, and Transcription logging in Windows PowerShell

Enable and configure Module, Script Block, and Transcription logging in Windows PowerShell

This post will show you how to enable and configure module, script block, and transcription logging in Windows PowerShell. Module logging allows you to specify the PowerShell modules that you want to log. Script block stores PowerShell commands that are run without the output, while transcription logging records the PowerShell commands that are run along with the full result of the command.

Read more »

Configure the Audit Group Membership Policy

Configure the Audit Group Membership Policy

We can configure the audit group membership policy using group policy, allowing us to record the group of a user in a login event log entry. This is used in addition to the Audit Logon policy to expand the information provided and include the group membership information of the user accessing the system.

Read more »

Configure the Audit PNP Activity Policy

Configure the Audit PNP Activity Policy

In this post we’ll show you how to configure the audit PNP activity policy in Windows Server 2016 via group policy.

PNP, or Plug and Play, is used so that the operating system automatically detects and configures an external device so that it’s ready to use. A common example is when you plugin a USB storage device and it “just works”. By auditing PNP activity, we can log events every time an external device is detected.

Read more »

Trend Micro CTF 2017 – Forensic 200 Write-up

Trend Micro CTF 2017 Forensic 200 challenge

The Trend Micro CTF 2017 was run again this year between the 24th and 25th of June 2017. This is my solution to the 200 point forensics challenge. I was only able to complete around 90% of the challenge during the actual CTF, I didn’t complete it until a week after it was over.

Read more »

Determine the differences and usage scenarios for using local audit policies and advanced auditing policies

Determine the differences and usage scenarios for using local audit policies and advanced auditing policies

We can enable auditing of various items in Windows Server 2016 by configuring both local audit policies and advanced audit policies with group policy. We will determine the differences and usage scenarios for using local audit policies and advanced auditing policies in this post.

Read more »

Implement Auditing Using Group Policy and AuditPol.exe

Implement Auditing Using Group Policy and AuditPol.exe

We can implement auditing using group policy and auditpol.exe in Windows Server 2016. This will allow us to log very specific events that take place within the operating system. We’ll demonstrate how to configure audit policies with both of these methods here.

Read more »

Create Expression-Based Audit Policies

Create Expression-Based Audit Policies

We can create expression-based audit policies which allow us to define a custom condition for an audit policy to apply to. The conditions that we can create are quite powerful as they use claim types and resource properties, allowing us to customize exactly how the audit policy should apply.

Read more »

Create and Configure Central Access Rules and Policies

Create and Configure Central Access Rules and Policies

We can create and configure Central Access Rules and policies that are automatically deployed to all file servers in our Active Directory based domain.

Central Access Rules (CARs) are used to control access to files and folders based on the resource properties that we have created.

The central access rule uses the user and device claims with resource properties to determine the permissions that should be set on particular files.

Read more »

Create and Configure Resource Properties and Lists

Create and configure resource properties and lists

We can create and configure resource properties and lists to specify extra properties that can be used on files and folders. A resource list simply contains one or more resource properties, both are created through Active Directory Administrative Center as we’ll see in the examples.

These are needed as part of a Dynamic Access Control (DAC) solution to create and configure central access rules.

Additional properties can be set on a file or folder using resource properties. This is similar to file classification but instead works at the domain level rather than only on the file server. We can use these resource properties to configure access to the file that they are applied to.

Read more »