[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Default config of Windows Event Logs Inadequate.  What are alternatives?

Posted on 2007-11-29
5
Medium Priority
?
250 Views
Last Modified: 2013-12-06
Greetings and Thank you for Your Help  :-)

I am the server manager.  I need to ensure the safety of my servers, and i want to easily find events that will tell what has happened over the weekend.  I want to ensure my logs will be safe no matter what (not just on another drive on the same machine, and not just backedup at midnight ---- I want them on another machine (a very secure machine) each hour or perhaps even DIRECTLY logged there.

I'm not interested in log parser, and yes, I do have auditing jacked up to log most things.  Note that I have not asked any question about FWs, IDS, or other security measures.  I'm mainly interested in logging what happens.

What are my options?  What are the pros/cons?  Can you get eventlogs to log directly to another machine?  Is there some software (turnkey) for all this?

Thanks again so very much!,
K

0
Comment
Question by:ksuchy
  • 2
  • 2
5 Comments
 
LVL 8

Accepted Solution

by:
wfcraven12 earned 675 total points
ID: 20377322
you could try this.

go into regedit & find all the entries (which i think there are just two) that point to where the .Evt files are located (should be something like %systemroot\sytem32\config).  Change the path to a mapped drive to something out on the network that's secure.  definitely try it on a test machine.  i just tried it on one of mine & it seemed okay at first glance.
0
 
LVL 57

Assisted Solution

by:McKnife
McKnife earned 675 total points
ID: 20377926
There are two ways I favor: Use snare (intersectalliance.com) and a syslog server (kiwi or snare server). This would enable you to forward each event in realtime to another server.
The other would be to back it up using the following script: http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/2003_Server/Q_22451747.html
0
 
LVL 19

Assisted Solution

by:CoccoBill
CoccoBill earned 150 total points
ID: 20380802
0
 
LVL 8

Expert Comment

by:wfcraven12
ID: 20381058
CoccoBill - that was already posted.  Look at first comment.
0
 
LVL 19

Expert Comment

by:CoccoBill
ID: 20381092
Yes, wfcraven12, I noticed. I just filled in the blanks in your post.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The business world is becoming increasingly integrated with tech. It’s not just for a select few anymore — but what about if you have a small business? It may be easier than you think to integrate technology into your small business, and it’s likely…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
Suggested Courses
Course of the Month18 days, 19 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question