Audit and Authentication Policy Change Events#20684
Audit and Authentication Policy Change Events#20684leehinman merged 5 commits intoelastic:masterfrom janniten:aa_policy_change
Conversation
|
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
1 similar comment
|
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
💚 Build Succeeded
Expand to view the summary
Build stats
Test stats 🧪
💚 Flaky test reportTests succeeded. Expand to view the summary
Test stats 🧪
|
|
Pinging @elastic/siem (Team:SIEM) |
|
jenkins, test this |
|
Hi! We're labeling this issue as |
|
I confirm 👍 |
|
Hi! We're labeling this issue as |
|
I still believe that those kind of events are important. Thank you |
|
💯 agree. Sorry it's taking so long to look these changes over. |
|
@andrewkroh New ECS 1.7.0 event category configuration used for auditory configuration and changes of this PR and in events from older PRs |
|
Hi! We're labeling this issue as |
|
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
|
Events related to audit configuration/changes are relevant when talking about defense evasion and also when you are under strong security regulations. |
|
Pinging @elastic/security-external-integrations , @andrewkroh |
|
@janniten do you mind if I rebase off master and fix some conflicts. There are a bunch in eventActionTypes, to support multiple values for event.category and event.type those are now arrays, so conflicts like: |
Hi @leehinman. No problem! Go ahead! |
I use in array values un order to suppport múltiples categoriew/types, but It is added later in code the when process the event. But it is much better to define It in the way you propose :) |
|
@janniten I couldn't push to your repo so I uploaded my changes here https://github.com/leehinman/beats/tree/janniten_aa_policy_change Can you take a quick look and see if that looks right? The intent was just address the eventActionTypes and to add golden files. |
@leehinman , LGTM |
x-pack/winlogbeat/module/security/config/winlogbeat-security.js
Outdated
Show resolved
Hide resolved
x-pack/winlogbeat/module/security/config/winlogbeat-security.js
Outdated
Show resolved
Hide resolved
|
run tests |
|
The new event IDs from this PR will need added to the list in https://www.elastic.co/guide/en/beats/winlogbeat/master/winlogbeat-module-security.html#winlogbeat-module-security. |
@andrewkroh , @leehinman Doc updated in #23674 |
…pack-when-oss-changes * upstream/master: [DOCS] Add setup content to Kubernetes and Cloud Foundry docs (elastic#23580) [CI] Mandatory windows support for all the versions (elastic#23615) Add check when retrieving the worker process id using performance counters (elastic#23647) Remove 4912 evtx from testing (elastic#23669) Add missing SSL settings (elastic#23632) Update X-Pack Packetbeat config (elastic#23666) Use hostname check from verify.go to handle patterns in TLS certs (elastic#23661) Fix: Dissect Cisco ASA 302013 message usernames (elastic#21196) Add FAQ entry for MADV settings in older versions (elastic#23429) Sync fixes from Integration Package Testing (elastic#23424) [Filebeat] Add Cisco ASA message '302023' parsing (elastic#23092) [Elastic Log Driver] Change hosts config flag (elastic#23628) Audit and Authentication Policy Change Events (elastic#20684)
* [Winlogbeat] Audit and Authentication Policy Change Events Co-authored-by: Lee E. Hinman <lee.e.hinman@elastic.co> (cherry picked from commit dd7a1b3)
…nts (#23659) * Audit and Authentication Policy Change Events (#20684) * [Winlogbeat] Audit and Authentication Policy Change Events Co-authored-by: Lee E. Hinman <lee.e.hinman@elastic.co> (cherry picked from commit dd7a1b3) * Remove 4912 evtx from testing (#23669) - causing failures on Win 7,8, 2008R2 & 2012R2 (cherry picked from commit d4e193d) * Add Winlogbeat Security Module Doc (#23674) * Add Winlogbeat Security Module Doc * Update source file used to generate security module docs (cherry picked from commit ee485bd) Co-authored-by: Anabella Cristaldi <33020901+janniten@users.noreply.github.com>
What does this PR do?
Note: Although processing of Event 4715 (The audit policy (SACL) on an object was changed) seems to be identical to 4670, event 4715 was not included due I was not able to generate an example event.
For events where exists information of DACLs or SACLs those ACL are translated from the SDDL (https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dtyp/f4296d69-1c0f-491f-9587-a960b292d070) to a human-readable from. For example:
Why is it important?
Auditing the changes in policies and event sources is crucial when we want to have a strong security monitoring system. Monitor these kinds of events are also important when we address compliance (SOX, PCI. HIPAA, etc )
The related.ip information is useful when we want to pivot data between different sources. For example
Fortinet Event (37141) indicating a user is connected to a VPN SSL when tunnelip is the asigned address. Tunnelip is also in the related.ip field
Windows Event 4624 indicating a windows login from a source.ip. If we have source.ip in the related.ip it is easy to match the user connected through VPN with a windows logon
Checklist
CHANGELOG.next.asciidocorCHANGELOG-developer.next.asciidoc.