4.2 Understand Kerberos Authentication and Domain Security
4.2 Understand Kerberos Authentication and Domain Security
4.2 Understand Kerberos Authentication and Domain Security
5
KERBEROS AUTHENTICATION PROCESS
Windows Authentication
is used to verify that the
information comes from a
trusted source, whether
from a person or
computer object, such as
another computer.
Windows Server Authentication
Windows Server Auditing and Logging
Windows auditing is a mechanism for tracking events. Knowing when and
where these events occurred and who triggered them can help when doing
Windows network forensics. It can also be very helpful with detecting
certain types of problems like improper rights assignments in the file
system.
3. Directory service access. Audit this to see when someone accesses an Active Directory @ directory service object that
has its own system access control list (SACL).
4. Logon events. Audit this to see when someone has logged on or off your computer (either while physically at your
computer or by trying to log on over a network).
5. Object access. Audit this to see when someone has used a file, folder, printer, or other object. While you can also audit
registry keys, we don't recommend that unless you have advanced computer knowledge and know how to use the
registry.
6. Policy change. Audit this to see attempts to change local security policies and to see if someone has changed user rights
assignments, auditing policies, or trust policies.
7. Privilege use. Audit this to see when someone performs a user right.
8. Process tracking. Audit this to see when events such as program activation or a process exiting occur.
9. System events. Audit this to see when someone has shut down or restarted the computer, or when a process or program
tries to do something that it does not have permission to do. For example, if malicious software tried to change a setting
on your computer without your permission, system event auditing would record it.
Windows Server Auditing and Logging