-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Audit and Authentication Policy Change Events #20684
Conversation
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
1 similar comment
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
💚 Build Succeeded
Expand to view the summary
Build stats
Test stats 🧪
💚 Flaky test reportTests succeeded. Expand to view the summary
Test stats 🧪
|
Pinging @elastic/siem (Team:SIEM) |
jenkins, test this |
Hi! We're labeling this issue as |
I confirm 👍 |
Hi! We're labeling this issue as |
I still believe that those kind of events are important. Thank you |
💯 agree. Sorry it's taking so long to look these changes over. |
@andrewkroh New ECS 1.7.0 event category configuration used for auditory configuration and changes of this PR and in events from older PRs |
Hi! We're labeling this issue as |
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
Events related to audit configuration/changes are relevant when talking about defense evasion and also when you are under strong security regulations. |
Pinging @elastic/security-external-integrations , @andrewkroh |
@janniten do you mind if I rebase off master and fix some conflicts. There are a bunch in eventActionTypes, to support multiple values for event.category and event.type those are now arrays, so conflicts like:
|
Hi @leehinman. No problem! Go ahead! |
I use in array values un order to suppport múltiples categoriew/types, but It is added later in code the when process the event.
But it is much better to define It in the way you propose :) |
@janniten I couldn't push to your repo so I uploaded my changes here https://github.com/leehinman/beats/tree/janniten_aa_policy_change Can you take a quick look and see if that looks right? The intent was just address the eventActionTypes and to add golden files. |
@leehinman , LGTM |
x-pack/winlogbeat/module/security/config/winlogbeat-security.js
Outdated
Show resolved
Hide resolved
x-pack/winlogbeat/module/security/config/winlogbeat-security.js
Outdated
Show resolved
Hide resolved
run tests |
The new event IDs from this PR will need added to the list in https://www.elastic.co/guide/en/beats/winlogbeat/master/winlogbeat-module-security.html#winlogbeat-module-security. |
@andrewkroh , @leehinman Doc updated in #23674 |
…pack-when-oss-changes * upstream/master: [DOCS] Add setup content to Kubernetes and Cloud Foundry docs (elastic#23580) [CI] Mandatory windows support for all the versions (elastic#23615) Add check when retrieving the worker process id using performance counters (elastic#23647) Remove 4912 evtx from testing (elastic#23669) Add missing SSL settings (elastic#23632) Update X-Pack Packetbeat config (elastic#23666) Use hostname check from verify.go to handle patterns in TLS certs (elastic#23661) Fix: Dissect Cisco ASA 302013 message usernames (elastic#21196) Add FAQ entry for MADV settings in older versions (elastic#23429) Sync fixes from Integration Package Testing (elastic#23424) [Filebeat] Add Cisco ASA message '302023' parsing (elastic#23092) [Elastic Log Driver] Change hosts config flag (elastic#23628) Audit and Authentication Policy Change Events (elastic#20684)
* [Winlogbeat] Audit and Authentication Policy Change Events Co-authored-by: Lee E. Hinman <[email protected]> (cherry picked from commit dd7a1b3)
…nts (#23659) * Audit and Authentication Policy Change Events (#20684) * [Winlogbeat] Audit and Authentication Policy Change Events Co-authored-by: Lee E. Hinman <[email protected]> (cherry picked from commit dd7a1b3) * Remove 4912 evtx from testing (#23669) - causing failures on Win 7,8, 2008R2 & 2012R2 (cherry picked from commit d4e193d) * Add Winlogbeat Security Module Doc (#23674) * Add Winlogbeat Security Module Doc * Update source file used to generate security module docs (cherry picked from commit ee485bd) Co-authored-by: Anabella Cristaldi <[email protected]>
What does this PR do?
Note: Although processing of Event 4715 (The audit policy (SACL) on an object was changed) seems to be identical to 4670, event 4715 was not included due I was not able to generate an example event.
For events where exists information of DACLs or SACLs those ACL are translated from the SDDL (https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dtyp/f4296d69-1c0f-491f-9587-a960b292d070) to a human-readable from. For example:
Why is it important?
Auditing the changes in policies and event sources is crucial when we want to have a strong security monitoring system. Monitor these kinds of events are also important when we address compliance (SOX, PCI. HIPAA, etc )
The related.ip information is useful when we want to pivot data between different sources. For example
Fortinet Event (37141) indicating a user is connected to a VPN SSL when tunnelip is the asigned address. Tunnelip is also in the related.ip field
Windows Event 4624 indicating a windows login from a source.ip. If we have source.ip in the related.ip it is easy to match the user connected through VPN with a windows logon
Checklist
CHANGELOG.next.asciidoc
orCHANGELOG-developer.next.asciidoc
.