SIEM Integration with SharePoint: Monitoring Access to the Sensitive Unstructured Data in SharePoint

Similar documents
Who s Attacking Your Database? Monitoring Authentication and Logon Failures in SQL Server

Using Splunk and LOGbinder to Monitor SQL Server, SharePoint and Exchange Audit Events

Not Monitoring SQL Server with Your SIEM is Close to Negligent: What are Your Options?

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB

SIEM Product Comparison

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB

Taming SharePoint Audit Logs with

Configuring LOGbinder for SQL Server

4 Ways Your Organization Can Be Hacked

Integrating LOGbinder SP EventTracker v7.x

Randtronics Data Privacy Manager

Netwrix Auditor Competitive Checklist

Monitoring Active Directory: Both Azure AD and On-Premise AD and How Synchronization and Federation Play In

Asset and network modeling in HP ArcSight ESM and Express

Introduction to MySQL. Database Systems

EnterSpace Data Sheet

Integration With Third Party SIEM Solutions NetIQ Secure Configuration Manager. October 2016

Holistic Database Security

How to Monitor Network Activity with the Windows Security & Firewall Logs to Detect Inbound and Outbound Attacks. Made possible by

ArcSight Activate Framework

Built-in functionality of CYBERQUEST

Tanium Connect User Guide. Version 4.8.3

The Vectra App for Splunk. Table of Contents. Overview... 2 Getting started Setup... 4 Using the Vectra App for Splunk... 4

IBM services and technology solutions for supporting GDPR program

Imperva CounterBreach

Security. Made Smarter.

Netwrix Auditor. Event Log Export Add-on Quick-Start Guide. Version: 8.0 6/3/2016

16898: A Forensic Analysis of Security Events on System z, Without the Use of SMF Data

Imperva Incapsula Website Security

Top 10 use cases of HP ArcSight Logger

Securing ArcGIS for Server. David Cordes, Raj Padmanabhan

Tripwire App for QRadar Documentation

OMS, ATA AND AZURE SECURITY CENTER MIXER

Countering the Insider Threat: Behavioral Analytics Security Intelligence Cell (BASIC)

Understanding Perimeter Security

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

NETWRIX ACTIVE DIRECTORY CHANGE REPORTER

Managing Large Windows Event Collection Implementations: Load Balancing Across Multiple Collectors

Integrated, Intelligence driven Cyber Threat Hunting

Ekran System v Program Overview

UCOP ITS Systemwide CISO Office Systemwide IT Policy. UC Event Logging Standard. Revision History. Date: By: Contact Information: Description:

USER GUIDE. LitExtension: YAHOO STORE to Magento Migration Tool

SentinelOne Technical Brief

USE CASE IN ACTION Splunk + Komand

Insiders are the New Malware

Pieter Wigleven Windows Technical Specialist

Security Information Event Management { IT Search } Pongsawat Payungwong CISSP,MCSE,ACSA Business Development Manager Sysware(Thailand) Co., Ltd.

ICS Security Monitoring

Mission Guide: Google Apps

Data Security. Database Firewalls, Encryption and SIEM Systems ABSTRACT CONTACT

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory

Log Management Delivers Intelligence with Speed

Secret Server Demo Outline

How to create a secure WordPress install v1.1

HOW TO MAXIMIZE THE VALUE OF YOUR SPLUNK INVESTMENT. PRESENTER: Adam Stetson Presales Engineer

Ekran System v Program Overview

Privileged Remote Access SIEM Tool Plugin Installation and Administration

HyTrust Heals Healthcare

DefendX Software Control-Audit for Hitachi Installation Guide

Competence Assurance Knowledge Tests Quick Guide for Administrators

CIS Top 20 #5. Controlled Use of Administrative Privileges

Introduction to MySQL. Database Systems

Quick Configuration Guide For Exchange Reporter Plus

SECURITY AND DATA REDUNDANCY. A White Paper

MICROSOFT SHAREPOINT SITE OWNER S MANUAL. Creating a Useful, Engaging Site for your Team to Love

State of the. Union. (or: How not to use Krebs as an IDS ) (Information Security) Jeff McJunkin Senior Technical Analyst Counter Hack Challenges

Google Identity Services for work

Training Tracker 6. PC Edition. Copyright Computer Directions, LLC

SIEM Tool Plugin Installation and Administration

Qualys Cloud Platform

McAfee MVISION Cloud. Data Security for the Cloud Era

Sharing is Caring: Improving Detection with Sigma

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer

ArcSight Express for the Mid-Market

1- Nov- 2010, Fall Member Mee2ng Chris Hyzer, Grouper developer

Manually Uninstall Sql Server 2008 R2 Express Remotely Login

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

Experience Security, Risk, and Governance

Manually Uninstall Sql Server 2008 R2 Express Remote Login

Technology Incident Response and Impact Reduction. May 9, David Litton

Ten Security Tips for SQL Server. Andy Warren

540: Tuning Microsoft SQL Server for SharePoint. Daniel Glenn

SIEM Solution Integration With Control Manager

UEBA User Entity Behavior Analytics Aristotle Insight Sergeant Laboratories

SentinelOne Technical Brief

Hp Enterprise Secure Key Manager User Guide

Security Automation Best Practices

TRANSPARENT ENCRYPTION ARCHITECTURE

CIS Top 20 #12 Boundary Defense. Lisa Niles: CISSP, Director of Solutions Integration

Bomgar SIEM Tool Plugin Installation and Administration

Zix Support for Standards

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database

Sentinel 8.0 includes new features, improves usability, and resolves several previous issues.

Printing Tips Revised: 1/5/18

Bolster Your IR Program. Eric Sun, Solutions Mgr, Incident Detection &

NETWRIX CHANGE REPORTER SUITE

Monitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins

Novetta Cyber Analytics

Transcription:

SIEM Integration with : Monitoring Access to the Sensitive Unstructured Data in Sponsored by 2016 Monterey Technology Group Inc. Made possible by Thanks to www.logbinder.com 1

Preview of Key Points Why important? Good news Bad news The solution Why important? Sensitive information in unstructured format abounds in If you are only monitoring the Windows Security Log you ll never know Persistent attacker progressively downloading every document you have Insider performing a Snowdown (Edward Snowden Download) Or be able to answer Who looked at this document before that information was leaked to the press? Who modified this document? What information is subject to compliance requirements in? 2

Monitoring document access in Good news has an audit log Can monitor all types of access to documents What document was accessed? Who accessed it? When was it accessed? How was it accessed? Can also monitor Permission changes group membership changes Admin authority changes Monitoring document access in Bad news The audit log isn t really a log It s accessible manually inside via browser Or by.net API in C# The raw audit log isn t readable Users, groups and other objects are labeled by ID code instead of actual name Each site has it s own audit policy that must be configured manually Self service site creation Audit log integrity Audit events can be purged by before collected Privileged users can erase events SIEMs can t access the audit log Even if they could the information wouldn t be valuable Don t confuse the audit log with s other non-security logs Comparing s 4 Audit Logs for Security and SIEM Integration 3

The raw audit log accessed manually LOGbinder bridges the gap between and your SIEM 4

Translates unreadable raw audit data into easy-to-read events Outputs in over 6 formats and protocols for any SIEM to consume LOGbinder Easy to integrate on your own but many SIEMs Already have built-in support QRadar, RSA, LogRhythm, LogPoint, SolarWinds, and more Are supported by LOGbinder developed resources ArcSight Splunk Automates site audit policy configuration Automates purging of old events after sending to SIEM Within minutes Correlate activity in with everything else going on in your network SQL Server and Exchange, too Alert on Information grabs Tripwires Set tripwires in How to get late stage but reliable detection of intruders? Set tripwires In these are called honey-sites or honey-documents 5

Bottom line monitoring is part of the next era of application level security intelligence SQL Server and Exchange The audit data is buried in Get it out and send it to your SIEM with LOGbinder 2016 Monterey Technology Group Inc. More information on audit logging https://www.ultimatewindowssecurity.com/sharepoint Audit Policy Audit Log LOGbinder SP Webinars https://www.logbinder.com/resources/ Whitepapers Comparing s 4 Audit Logs for Security and SIEM Integration Comparison: ArcSight Connector for DB and LOGbinder for Audit Logging With HP ArcSight and LOGbinder Top 6 Security Events to Audit in Audit Events List LOGbinder for Datasheet SIEM Integration Resources ArcSight CEF Configuration Guide ArcSight Content Pack for LOGbinder for Installing GFI EventsManager LOGbinder for Compliance Guidance LogRhythm and LOGbinder for Solution Brief Recommended Reports and Alerts Designs for LOGbinder for Splunk App for LOGbinder Splunk App for LOGbinder Integration Guide 6

Next steps Download LOGbinder for https://www.logbinder.com/form/lbspdownload Schedule a demo https://www.logbinder.com/form/ask 7