Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: H C (keydet89yahoo.com)
Date: Wed Aug 29 2001 - 13:58:28 CDT
I agree 100% with the idea of a conceptual framework
for auditing systems. Since I have some experience
with this on Windows systems, I thought I'd respond...
The first step is to understand what it is you're
looking for. Auditing systems for installed software
is different from auditing for security. On NT/2K
systems, 'security' is made up of several components:
2. Audit settings
3. User info, group membership, and privileges
4. Registry settings (keys, values)
5. Services (running, stopped, current status)
A variety of freeware tools exist to retrieve all of
this information, and more. However, they all provide
different output, so the information must still be
Further, the sysadmin must interpret the data.
Commercial tools assume an arbitrary definition of
'security', and generally do not consider issues such
as firewall rulesets, NAT'ing, domain structures,
VLANS, etc. Also, security policies must be
At Usenix's LISA-NT '00, I presented a framework for
situations just like these...and a very similar
framework is also applicable to incident response. The
solution basically amounts to using either a series of
Perl scripts, or one big one, to retrieve the data of
interest from remote systems. This information may
then be filtered by additional scripts, and analyzed
by the sysadmin.
I'd be happy to discuss this further either here in
the forum, or via email.
Do You Yahoo!?
Get email alerts & NEW webcam video instant messaging with Yahoo! Messenger