Who s Attacking Your Database? Monitoring Authentication and Logon Failures in SQL Server

Similar documents
Not Monitoring SQL Server with Your SIEM is Close to Negligent: What are Your Options?

Using Splunk and LOGbinder to Monitor SQL Server, SharePoint and Exchange Audit Events

SIEM Integration with SharePoint: Monitoring Access to the Sensitive Unstructured Data in SharePoint

SIEM Product Comparison

Taming SharePoint Audit Logs with

Integrating LOGbinder SP EventTracker v7.x

Netwrix Auditor Competitive Checklist

SQL Server Course Administering a SQL 2016 Database Infrastructure. Length. Prerequisites. Audience. Course Outline.

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Securing ArcGIS Services

Integrate Microsoft Office 365. EventTracker v8.x and above

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB

WMI log collection using a non-admin domain user

DefendX Software Control-Audit for Hitachi Installation Guide

ActivIdentity 4TRESS AAA and Splunk. Integration Handbook

Once the VM is started, the VirtualBox OS Manager window can be closed. But our Ubuntu VM is still running.

Windows. Not just for houses

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

SAS Activity-Based Management Server Software 6.1 for Windows

Administering a SQL Database Infrastructure (M20764)

Securing ArcGIS for Server. David Cordes, Raj Padmanabhan

EnterSpace Data Sheet

AccessData ediscovery 6.1 SP1 Release Notes

Netwrix Auditor for Active Directory

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database

AccessData ediscovery 6.3 and Patches Release Notes

Netwrix Auditor for Active Directory

LepideAuditor. Compliance Reports

Administering a SQL Database Infrastructure Microsoft Official Curriculum (MOC 20764)

NETWRIX GROUP POLICY CHANGE REPORTER

Manually Create Distribution Database Sql Server 2005 Move

METADATA FRAMEWORK Release Notes

Tripwire App for QRadar Documentation

Course 20764: Administering a SQL Database Infrastructure

2012 Peer Small Business Data

Polaris Under the Hood. Prepared by: Wes Osborn

LEARN READ ON TO MORE ABOUT:

Monitoring Active Directory: Both Azure AD and On-Premise AD and How Synchronization and Federation Play In

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

LepideAuditor SIEM Integration

Netwrix Auditor. Event Log Export Add-on Quick-Start Guide. Version: 8.0 6/3/2016

McAfee EMM Best Practices Document Upgrading your High Availability EMM installation

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

User Manual. ARK for SharePoint-2007

4 Ways Your Organization Can Be Hacked

Locking down a Hitachi ID Suite server

Configuring LOGbinder for SQL Server

Install and Configure Active Directory Domain Services

A guide to configure agents for log collection in Log360

Important notice regarding accounts used for installation and configuration

Windows. Not just for houses

Office365 / G Suite Backup Manual

Goverlan Remote Control v7 vs. Microsoft Remote Assistance

NTP Software File Auditor for Hitachi

Centrify for ArcSight Integration Guide

AccessData ediscovery 6.3 and Patches Release Notes

KASPERSKY SECURITY CENTER 10 & KASPERSKY SECURITY FOR SERVER

Colligo Engage Console. User Guide

How to create a System Logon Account in Backup Exec for Windows Servers

NotifySCM Workspace Administration Guide

Symantec Backup Exec Quick Installation Guide

VMware Horizon Session Recording Fling:

Michael Wells Microsoft Specialist, Dell EMC. SQL DBaaS on Microsoft Azure Stack

[AVNICF-MCSASQL2012]: NICF - Microsoft Certified Solutions Associate (MCSA): SQL Server 2012

Securing ArcGIS Server Services An Introduction

Integrate F5 BIG-IP LTM

Workspace ONE UEM Upgrade Guide

Security in the Privileged Remote Access Appliance

SQL Server Security. Marek

29 March 2017 SECURITY SERVER INSTALLATION GUIDE

Integrate Microsoft ATP. EventTracker v8.x and above

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

CLB379 SharePoint 2010 Extranets and Authentication. Peter Carson President Envision IT

IP-guard v3.2 Migration Guideline

Implementation Quick Guide. EZManage SQL Pro

Installing and Configuring System Center Operations Manager 2007 R2

Technical Notes. ClearWeigh on SQL Server

EventTracker Upgrade Guide. Upgrade to v9.0

IT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao

Team TimeSheet for Outlook & SharePoint Client Installation and Configuration ( Per User Installation and Per Machine Installation )

ESET Secure Authentication

Configure SharePoint Server 2010 as a single server with the Unitrends appliance. farm with the Unitrends appliance

FRAMEWORK VERSION 3.0 NETWORK INSTALLATION INSTALLING MICROSOFT STEP BY STEP INTERACTIVE TRAINING SOFTWARE

DreamFactory Security Guide

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices

Splashtop Enterprise for IoT Devices - Quick Start Guide v1.0

ZENworks Mobile Workspace Configuration Server. September 2017

24 ThinManager Security

Integrate Veeam Backup and Replication. EventTracker v9.x and above

Pre-Installation Checklist v5.0

Centrify Suite Enterprise Edition Self-Paced Training

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

How To Embed EventTracker Widget to an External Site

Instructions for running the Microsoft Assessment and Planning Toolkit (MAP)

UCOP ITS Systemwide CISO Office Systemwide IT Policy. UC Event Logging Standard. Revision History. Date: By: Contact Information: Description:

HP Database and Middleware Automation

Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode.

Upgrade Guide. Upgrading to EventTracker v6.4 b50. Upgrade Guide Centre Park Drive Publication Date: Feb 17, 2010.

Transcription:

Who s Attacking Your Database? Monitoring Authentication and Logon Failures in SQL Server Sponsored by 2016 Monterey Technology Group Inc. Made possible by Thanks to www.logbinder.com 1

Preview of Key Points 2 kinds of authentication 3 sources of logon audit events Logon failure scenarios Bey0nd failed logons LOGbinder 2 kinds of authentication 2

All 3 needed! 3 sources of logon audit events SQL Server Active Directory Local Server Type of logon SQL Authentication Windows Authentication 3 sources of logon audit events Log source SQL Server Actual authentication failures (e.g. bad password) Problems with the account s status in SQL Server Active Directory Problems with the AD account s status/permissions within SQL Server Local Account Problems with the local account s status/permissions within SQL Server Active Directory Nothing Actual authentication failures (e.g. bad password) Problems with the account s status in AD Nothing Local Server Nothing Possibly 4625 Actual authentication failures (e.g. bad password) Problems with the account s status in local server 3

3 sources of logon audit events Active Directory Security Event Log Local Server Security Event Log SQL Server Application log SQL Audit Security Log Account Logon events Authentication not logon session Logged on domain controllers when account is in AD Logged on SQL Server s local Windows Security Log when a local account Logon events Not authentication actual logon session Always logged on SQL Server s local Windows Security Log when a local account AD account Local account 4

SQL logon events Application log Only logon events SQL Audit (SQL 2008+) Logon events Plus so much more https://www.ultimatewindowssecurity.com/sqlserver/auditpolicy/auditact iongroups/default.aspx SQL Logon Events in Application Log 5

SQL Audit Real audit solution Blows away C2 and SQL TRACE Logon events just the tip of the iceberg Lowest performance hit Zero touch for SIEM and log management with LOGbinder Applicati on Event ID LOGbinder Event ID Key text Windows only Windows and SQL AD/Windows account has no correspondi ng login in SQL Login disabled in SQL 18456 24003 Could not find a login matching the name provide 18470 The account is disabled Logon failure scenarios Login has no access to DB Login has no permission to connect to database engine 18456 Failed to open the explicitly specified database Token-based server access validation failed with an infrastructure error SQL only SQL Authenticati on not enabled Bad password Locked out An attempt to login using SQL authentication failed. Server is configured for Windows authentication only An error occurred while evaluating the password Login failed for user 'john'. Reason: Password did not match that for the user provided. [D The account is currently locked out. The system administrator can unlock it 6

SQL Audit Beyond logon auditing What happens once some is in? SQL Audit is the only way to track Security changes Logins, roles, permissions Privileged operations Backing up databases Bulk selects Manual modifications to tables Direct access by end users SQL Audit SQL Audit Local event log Binary file 5 reasons why you SQL Audit Binary format is the best way Performance Security Stability Hard to understand DB admin push back 7

SQL Audit Binary audit log Output to any folder on network SIEM connector can then read it with zero-touch to production DB server Hands off! Fast, fast, fast Binary file I/O is the fastest there is No context changes flipping in and out of Windows API Both directions But how do you get the binary audit log into your SIEM? LOGbinder for SQL Server SQL Audit Active Directory Windows Server 8

LOGbinder Small efficient Windows service that runs on any Windows server on your network One instance of LOGbinder SQL can process logs from many SQL Servers LOGbinder SQL can coexist with other LOGbinder products like LOGbinder EX for Exchange and LOGbinder SP for SharePoint Simply configure each SQL Server (optionally with our free SQL Server Audit Wizard) to write its audit events to a specified folder and then provide those folders to LOGbinder SQL. LOGbinder SQL 1. Processes events as they appear in SQL Server binary audit log files 2. Translates them into easy-to-read events http://www.logbinder.com/products/lo GbinderSql/EventsGenerated 3. Forwards to your SIEM solution in its native format ArcSight, Qradar, McAfee, EventTracker, LogRhythm, LogPoint, SolarWinds, Splunk and many, many more 5 minute setup LOGbinder 9

SQL Events showing up in your SIEM within seconds LOGbinder LOGbinder Benefits Application security intelligence for SQL Server Fill the audit gap in your compliance efforts Catch APTs that have penetrated upstream defenses Less push back from database admins Zero Impact Use SQL Server s fastest, most efficient audit log output method and thereby offload all subsequent log processing from busy database servers to a server of your choice. No agent required. LOGbinder SQL does not require an agent to be installed on your SQL Servers. In fact, LOGbinder SQL doesn t even need to send a single packet to your database servers. Know what s happening inside of SQL Server including Security operations involving logins, roles and permissions Maintenance of tables, stored procedures and any other object Database operations like backup and restore Transact SQL table commands like insert, delete, update and select Correlate SQL Server security activity with related events from the rest of your environment No data silos or additional consoles to monitor 10

Bottom line People can attack SQL server and break into You ll never know if you are only watching Windows security log SQL Logon auditing is only the beginning What happens when they do break in? SQL Audit is the answer LOGbinder delivers SQL Audit events to your SIEM with zero touch 2016 Monterey Technology Group Inc. 11