[logs] Re: [Windows] Privileges field in 560 events

From: Jean-Baptiste Marchand (Jean-Baptiste.Marchandat_private)
Date: Mon Jun 30 2003 - 03:37:33 PDT


[ Some more information, for those interested... ]

* Jean-Baptiste Marchand <Jean-Baptiste.Marchandat_private> [26/06/03 - 17:48]:

[...]

> One first thing important to know is that, once the _Audit object
> access_ category is enabled, you'll see some 560 events in the Windows
> security eventlog, even if you haven't enabled auditing on any of your
> own objects.
> 
> This is because some internals objects, more precisely the LSA Policy
> objects and objects in the SAM hierarchy have, by default, a SACL.
> 
> You can examine and modify the SACL on these objects using the lsaacl
> and samacl tools:
> 
>  http://razor.bindview.com/tools/desc/acltools1.0-readme.html

Default SACL on SAM objects are documented in MSKB #149401:

http://support.microsoft.com/?kbid=149401

However, this article only mentions Windows NT 4.0, whereas it probably
also applies to Windows 2000 and Windows Server 2003.


By the way, on Windows Server 2003, there are also default SACL on the
following objects:

 - The C:\WINDOWS\tasks\ directory
   (you can examine the content of the SACL using subinacl, part of
    Windows Server 2003 Resource Kit Tools).

 As a consequence, when a scheduled task is added, a 560 event is logged
in the Security eventlog:

-----------------------------------------------------------------------

Event Type:	Success Audit
Event Source:	Security
Event Category:	Object Access 
Event ID:	560
Date:		xx/xx/2003
Time:		xx:xx:xx
User:		NT AUTHORITY\SYSTEM
Computer:	BLAH
Description:
Object Open:
 	Object Server:	Security
 	Object Type:	File
 	Object Name:	C:\WINDOWS\Tasks\At1.job
 	Handle ID:	3464
 	Operation ID:	{0,171812}
 	Process ID:	936
 	Image File Name:	C:\WINDOWS\system32\svchost.exe
 	Primary User Name:	BLAH$
 	Primary Domain:	MYDOMAIN
 	Primary Logon ID:	(0x0,0x3E7)
 	Client User Name:	-
 	Client Domain:	-
 	Client Logon ID:	-
 	Accesses:	READ_CONTROL 
			SYNCHRONIZE 
			WriteData (or AddFile) 
			AppendData (or AddSubdirectory or CreatePipeInstance) 
			WriteEA 
			ReadAttributes 
			WriteAttributes 
			
 	Privileges:	-
 	Restricted Sid Count:	0
 	Access Mask:	0x120196


-----------------------------------------------------------------------


 - The Security\ registry key, under the Eventlog service configuration
   key, has also a default SACL (you can examine the content of the SACL
   on this key using regedit):

-----------------------------------------------------------------------

Event Type:	Success Audit
Event Source:	Security
Event Category:	Object Access 
Event ID:	560
Date:		xx/xx/2003
Time:		xx:xx:xx
User:		BLAH\Administrator
Computer:	BLAH
Description:
Object Open:
 	Object Server:	Security
 	Object Type:	Key
 	Object Name:	\REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Eventlog\Security
 	Handle ID:	496
 	Operation ID:	{0,141880}
 	Process ID:	1816
 	Image File Name:	C:\WINDOWS\system32\mmc.exe
 	Primary User Name:	Administrator
 	Primary Domain:	BLAH
 	Primary Logon ID:	(0x0,0x124B8)
 	Client User Name:	-
 	Client Domain:	-
 	Client Logon ID:	-
 	Accesses:	Set key value 
			
 	Privileges:	-
 	Restricted Sid Count:	0
 	Access Mask:	0x2

-----------------------------------------------------------------------

This can be annoying, because each time the administrator refreshes the
view on the Security eventlog, two events (560 and 562) are logged in
the Security eventlog. To avoid this, the SACL can be modified using
regedit. 


Jean-Baptiste Marchand
-- 
Jean-Baptiste.Marchandat_private
Hervé Schauer Consultants
http://www.hsc.fr/
_______________________________________________
LogAnalysis mailing list
LogAnalysisat_private
http://lists.shmoo.com/mailman/listinfo/loganalysis



This archive was generated by hypermail 2b30 : Mon Jun 30 2003 - 08:37:30 PDT