programming4us
programming4us
DESKTOP

Using Standard NT Security Features in Windows 7 : WORKING DIRECTLY WITH WINDOWS NT SECURITY (part 5) - Auditing Files and Directories

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

6. Auditing Files and Directories

It's possible to audit many user (or other principal) activities by placing an audit directly on the user. However, the number of event log entries generated by such an action can be overwhelming. In many cases, you end up with too much information to process successfully. An alternative is to place an audit on the resource. This form of audit is targeted and generates just the messages you need. Of course, if you really do want to monitor all a user's activities, you still need to place an audit on the user. The following sections show how to place an audit on a file, but you can easily extend the techniques to work with other resource types.

6.1. Configuring the Audit Activity Example

This example begins with a Windows Forms application that has a single button, btnAudit, which the user clicks to add or remove auditing. Because this application deals with auditing. You also need to add the following using statements:

using System.Security.AccessControl;
using System.Security.Principal;
using System.IO;

6.2. Writing the Audit Activity Code

It monitors the state of auditing on the file. If the file isn't audited, then the code adds auditing to it; otherwise, the code removes auditing from the file. The basic process is the same as adding an access rule to a file, except that you work with the SACL rather than the DACL. Listing 7 shows the code required for this example.

Example 7. Performing an audit of actions on a file or directory
private void btnAudit_Click(object sender, EventArgs e)
{
    // Create a file security object for the target file.
    FileSecurity FS = File.GetAccessControl(
        Application.StartupPath + @"\Temp.TXT",
        AccessControlSections.Audit);

    // Create a new rule.
    FileSystemAuditRule Rule = new FileSystemAuditRule(
        new NTAccount(@"BUILTIN\Users"),
        FileSystemRights.Write,
        AuditFlags.Failure);

    // Obtain a list of the existing rules.
    AuthorizationRuleCollection AuditRules =
        FS.GetAuditRules(true, true,
            typeof(NTAccount));

    // Check for the existence of the rule in the collection.
    Boolean FoundIt = false;
    foreach (FileSystemAuditRule AR in AuditRules)

        // Look for the rule.
        if ((AR.IdentityReference == Rule.IdentityReference) &&
            (AR.FileSystemRights.HasFlag(FileSystemRights.Write)) &&
            (AR.AuditFlags.HasFlag(AuditFlags.Failure)))
        {
            // Set FoundIt appropriately.
            FoundIt = true;

					  

// Exit the loop.
            break;
        }

    // Add or remove the rule as appropriate.
    if (FoundIt)

        // Remove the rule from the file security object.
        FS.RemoveAuditRule(Rule);

    else

        // Add the rule to the file security object.
        FS.AddAuditRule(Rule);

    // Save the rule to the file.
    File.SetAccessControl(
        Application.StartupPath + @"\Temp.TXT", FS);

    // Display a success message.
    MessageBox.Show("Change Succeeded!");
}

The code begins by creating a FileSecurity object, FS, using Temp.TXT. Notice that you must include the AccessControlSections.Audit argument in this case. The default is to provide a FileSecurity object for the DACL, so you must tell the system that you actually want to work with the SACL instead.

The next step is to create a FileSystemAuditRule, Rule, that provides the user account, right to monitor, and type of monitoring to perform as input. There are 23 different FileSystemRights values you can use to define the rights you want monitored, and you can "or" the values together as needed (such as FileSystemRights.Write | FileSystemRights.Read for both read and write access). The audit flags are AuditFlags.Failure and AuditFlags.Success. If you want to monitor both success and failure, you "or" the flags together (AuditFlags.Failure | AuditFlags.Success).

At this point, the code can begin checking for the presence of a particular auditing rule. It creates an AuthorizationRuleCollection object, AuditRules, which includes both explicit and inherited audit rules of type NTAccount. The code uses a for loop to review each of the FileSystemAuditRule entries, AR, in turn. To successfully find a particular rule, you must check the IdentityReference, FileSystemRights, and AuditFlags properties. The HasFlag() method makes it easy to find particular flags in the list. Once the code finds the entry of interest, it sets FoundIt to true and breaks out of the loop.

One of two events can happen at this point. The code can call RemoveAuditRule() to remove the rule from the list or AddAuditRule() to add the rule to the list based on the value of FoundIt. The code then calls SetAccessControl() to set the new rules in place.

Viewing the results is a little more complicated than viewing access rights. Use these steps to see the audit rights:

  1. Right-click Temp.TXT and choose Properties from the Context menu.

  2. Select the Security tab.

  3. Click Advanced to display the Advanced Security Settings for Temp.TXT dialog box shown in Figure 15.

  4. Select the Auditing tab as shown in Figure 15. Notice that even when using this editor, you must rely on privilege elevation to see the entries.

  5. Click Continue. You'll see a second Advanced Security Settings for Temp.TXT dialog box open with just an Auditing tab, as shown in Figure 16. This time, you can see the audit rule the application created.

    Figure 15. Viewing the audit entries requires administrator privileges.
    Figure 16. The example creates an audit rule for a failure to successfully write to the file by the Users account.
Other  
  •  Using Standard NT Security Features in Windows 7 : UNDERSTANDING BASIC NT SECURITY
  •  Windows Server 2008 R2 networking : Planning and Deploying a TCP/IP Network Infrastructure (part 2) - Policy-based QoS
  •  Windows Server 2008 R2 networking : Planning and Deploying a TCP/IP Network Infrastructure (part 1)
  •  Windows Server 2008 R2 networking : Overview of Windows Server 2008 R2 Networking
  •  Windows Server 2003 : Recovering from System Failure
  •  Windows Server 2003 : Advanced Backup and Restore (part 2) - Scheduling Backup Jobs, Shadow Copies of Shared Folders
  •  Windows Server 2003 : Advanced Backup and Restore (part 1) - Managing Media, Backup Options, The Ntbackup Command
  •  Windows Server 2003 : Managing and Implementing Disaster Recovery - Restoring Data
  •  Windows 7 : Networking and HomeGroup Sharing - Sharing Between PCs (part 2) - Old-School Sharing
  •  Windows 7 : Networking and HomeGroup Sharing - Sharing Between PCs (part 1) - HomeGroup Sharing
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us