Trace Windows Administrators Login Activities with Safed
Sometimes it is required to trace login/logoff activities of the administrator in order to be compliant with legal guidelines or simply for security reasons (see also our article “What to do with all those logs“). The Safed agent for Windows can be easily configured to collect administrator’s login/logoff. The agent is deployed with some administrator discovery commands, which it can execute in order to obtain the list of the admin of the domain and then to create a filtering objective. All events that concern with administrator’s login/logoff will be captured, formatted and then sent to the log server.
This simple solution may have its drawbacks. For example when Safed monitors a domain controller with Kerberos login/logoff authentications, the number of the captured events can become really high, creating fast growing log files on Safed, as well as on the collector server sides. Here some tuning has to be done. First of all, you have to set the administrator’s filter as the last evaluated one (see picture below). Then you can define some filtering objectives with the “Exclude General Search Type” enabled.
Fill the regexp enabled General Search Term field with what you need to be excluded from elaboration and forwarding (see picture below). So only what really is desired from the Administrator’s login/logoff will be processed by the last filter and forwarded to the log server.
“Hi guys! I’m Mihail and since the university years I has been fascinated by distributed systems and measurements on them. Now when I join the Neteye project I get the possibility to continue with this passion and this is great. My free time is completely dedicated to my wife and my daughters, I simply love them.”
Author
MarinovMihail
“Hi guys! I’m Mihail and since the university years I has been fascinated by distributed systems and measurements on them. Now when I join the Neteye project I get the possibility to continue with this passion and this is great. My free time is completely dedicated to my wife and my daughters, I simply love them.”
Creating hosts in NetEye’s Director module can sometimes be time-consuming and a repetitious, tiring and boring job. Especially if you have to populate Director with a large number of hosts for setting up a test environment, for example. One solution Read More
The Safed agent keeps track of the events it receives from the Eventlog by keeping the LastEventID in registry. At start time the agent tries to retrieve all events from Windows Eventlog since starting from the LastEventID. When the amount Read More
The Safed agent can be configured via https and send its collected logs to the log collector though a TLS connection. The latest released version - 1.9.1 - supports TLS 1.2 (at a minimum) and TLS 1.3. The first step Read More
As well known, the Safed agent for Windows can collect events from the event log, filters them and forward the matched records to a centralized syslog server. There are some preconfigured set of events concerning basic activities that have to Read More
This new feature has been introduced for the auditing of Cluster installations and hosts with multiple IP addresses. The concept behind the aggregation of flows from different sources resides on the integration of log flows from load balanced hosts or Read More