{"id":4304,"date":"2015-02-08T18:29:37","date_gmt":"2015-02-08T16:29:37","guid":{"rendered":"http:\/\/www.imacandi.net\/sin\/blog\/?p=4304"},"modified":"2015-02-08T18:29:37","modified_gmt":"2015-02-08T16:29:37","slug":"citire-windows-security-events-remote","status":"publish","type":"post","link":"https:\/\/www.imacandi.net\/sin\/blog\/2015\/02\/08\/citire-windows-security-events-remote.html","title":{"rendered":"citire windows security events remote"},"content":{"rendered":"<p style=\"text-align: justify;\">In viata oricarui om care are treaba cu Windows vine momentul ala in care vrei sa citesti remote Security events de pe un server remote.<\/p>\n<p style=\"text-align: justify;\">Pentru ca Windows, pentru ca Security si pentru ca vrei remote &#8211; e un pic complicat :)<\/p>\n<p style=\"text-align: justify;\">In Windows 2008 exista un grup built-in numit <strong>Event Log Readers<\/strong> care are permisiune sa citeasca ce scrie in logurile de <strong>Security<\/strong> (are un SID predeterminat care este trecut in permisiunile pentru Event Viewer Security). Daca ai un user local si vrei sa-i dai voie sa citeasca logurile, il bagi un grupul asta si treaba e terminata.<\/p>\n<p style=\"text-align: justify;\">Cand vrei sa faci asta remote, trebuie sa te scarpini un pic.<\/p>\n<ol style=\"text-align: justify;\">\n<li>Se creeaza un user obisnuit (sa-i zicem <strong>logreader<\/strong>) si se face membru in <strong>Event Log Readers<\/strong>.<\/li>\n<li>Ne logam ca administrator pe masina target<\/li>\n<li>Umblam la permisiunile de <strong>DCOM<\/strong> astfel:\n<ol>\n<li><strong>Start<\/strong> -&gt; <strong>Run<\/strong> -&gt; <strong>dcomcnfg<\/strong><\/li>\n<li>In casuta <strong>Component Services<\/strong>, se expandeaza <strong>Component Services<\/strong>, dupa aia <strong>Computers<\/strong> si dupa aia dai click dreapta pe <strong>My Computer<\/strong><\/li>\n<li>In casuta de dialog, click pe tab-ul <strong>COM Security<\/strong><\/li>\n<li>Dupa aia, se selecteaza <strong>Launch and Activation Permissions<\/strong>.<\/li>\n<li>In campul de <strong>Launch Permissions<\/strong>, click pe <strong>Edit Limits<\/strong>, se adauga acolo grupul <strong>Event Log Readers<\/strong> si ca permisiuni pentru el\u00a0se selecteaza <strong>Remote Launch<\/strong> si <strong>Remote Activation<\/strong><\/li>\n<li>In campul <strong>Access Permissions<\/strong>, click pe <strong>Edit Limits<\/strong>, se adauga grupul <strong>Event Log Reader<\/strong> si la permisiuni se selecteaza <strong>Remote Access<\/strong><\/li>\n<li>Click pe <strong>OK<\/strong> in toate casutele de dialog si am terminat cu <strong>DCOM<\/strong><\/li>\n<\/ol>\n<\/li>\n<li>Umblam la permisiunile <strong>WMI<\/strong> asttfel:\n<ol>\n<li><strong>Control Panel<\/strong> -&gt; <strong>Administrative Tools<\/strong> -&gt; <strong>Computer Management<\/strong><\/li>\n<li>In fereastra de <strong>Computer Management<\/strong>, click pe <strong>Services and Applications<\/strong>, apoi click dreapta pe <strong>WMI Control<\/strong> si dupa aia click pe <strong>Properties<\/strong><\/li>\n<li>Se selecteaza tab-ul <strong>Security<\/strong><\/li>\n<li>Se selecteaza <strong>Root<\/strong> -&gt; <strong>CIMV2<\/strong> si dupa aia click pe <strong>Security<\/strong><\/li>\n<li>Se adauga grupul <strong>Event Log Readers<\/strong> si dupa aia click pe <strong>Advanced<\/strong><\/li>\n<li>In fereastra\u00a0<strong>Advanced<\/strong>, se da click pe grupul <strong>Event Log Readers<\/strong> dupa aia click pe butonul <strong>Edit<\/strong> si acolo se selecteaza ca permisiuni <strong>Enable Account<\/strong> si <strong>Remote Enable<\/strong>, iar la <strong>Apply to<\/strong> se selecteaza <strong>This namespace and subnamespaces<\/strong><\/li>\n<li>Se da <strong>OK<\/strong> pana se termina cu toate casutele de dialog<\/li>\n<\/ol>\n<\/li>\n<li>Din <strong>Services<\/strong> se da restart la <strong>Windows Management Instrumentation<\/strong> (daca e Domain Controller, trebuie reboot)<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">Si voila, acum putem citi remote logurile de securitate de pe o masina Windows Server 2008+ folosind un utilizator fara nici un drept special.<\/p>\n<p style=\"text-align: justify;\">Ce-am descris mai sus este varianta kosher si corecta, adica aplicand principiul Least Privilege.<\/p>\n<p style=\"text-align: justify;\">Mai exista si o varianta si mai complicata, care presupune drepturi pe user si nu pe grup, insa trebuie modificate si permisiunile pe Event Viewer Security care sunt un picut mai voodoo de facut. Asta poate necesara cand ai un mediu de tip\u00a0High Security Assurance si ai si resurse sa inspectezi fiecare bit si fiecare permisiune sa nu scape ceva pe langa.<\/p>\n<p style=\"text-align: justify;\">Daca ne doare la bascheti de securitate, varianta simpla e sa faci userul cu care vrei sa citesti logurile remote membru in Domain Admins si ai rezolvat problema din 3 click-uri.<\/p>\n<p style=\"text-align: justify;\">Mai invatai si io ceva azi :)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In viata oricarui om care are treaba cu Windows vine momentul ala in care vrei sa citesti remote Security events de pe un server remote. Pentru ca Windows, pentru ca Security si pentru ca vrei remote &#8211; e un pic complicat :) In Windows 2008 exista un grup built-in numit Event Log Readers care are &hellip; <a href=\"https:\/\/www.imacandi.net\/sin\/blog\/2015\/02\/08\/citire-windows-security-events-remote.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">citire windows security events remote<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"ngg_post_thumbnail":0,"footnotes":""},"categories":[2],"tags":[7],"class_list":["post-4304","post","type-post","status-publish","format-standard","hentry","category-diverse","tag-computers"],"_links":{"self":[{"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/posts\/4304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/comments?post=4304"}],"version-history":[{"count":8,"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/posts\/4304\/revisions"}],"predecessor-version":[{"id":4312,"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/posts\/4304\/revisions\/4312"}],"wp:attachment":[{"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/media?parent=4304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/categories?post=4304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.imacandi.net\/sin\/blog\/wp-json\/wp\/v2\/tags?post=4304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}