What to watch with your FIM?
- “System” files - They will help you to detect if a server is compromised, if its configuration has been changed or if users are performing dangerous activities (like copying files or installing applications).
- “Data” files - Those are the files used by your “business".
- Logging changes on source repository (to track the developers tasks)
- Logging changes on sensitive department shares (HR, accounting, …)
- Logging changes on public resources (like web servers, FTP servers)
/etc |
/boot |
/bin |
/sbin |
/usr/bin |
/usr/sbin |
/usr/local/etc |
/usr/local/bin |
/usr/local/sbin |
/usr/local/etc |
/opt |
/var/opt |
/lib |
/usr/lib |
/var/lib |
/usr/local/lib |
/lib64 |
Specific files can be monitored:
- Executables in /tmp ,/usr/local/tmp, /var/tmp
- Plain files in /dev
/etc/mtab |
/etc/hosts.deny |
/etc/mail/statistics |
/etc/random-seed |
/etc/adjtime |
For Windows systems:
%WINDIR%/win.ini |
%WINDIR%/system.ini
|
C:\autoexec.ba
|
C:\boot.ini |
%WINDIR%/System32 |
%WINDIR%/regedit.exe |
C:\Documents and Settings/All Users/Start Menu/Programs/Startup |
C:\Users/Public/All Users/Microsoft/Windows/Start Menu/Startup |
HKEY_LOCAL_MACHINE\Software\Classes\cmdfile |
HKEY_LOCAL_MACHINE\Software\Classes\comfile |
HKEY_LOCAL_MACHINE\Software\Classes\exefile |
HKEY_LOCAL_MACHINE\Software\Classes\piffile |
HKEY_LOCAL_MACHINE\Software\Classes\AllFilesystemObjects |
HKEY_LOCAL_MACHINE\Software\Classes\Directory |
HKEY_LOCAL_MACHINE\Software\Classes\Folder |
HKEY_LOCAL_MACHINE\Software\Classes\Protocols |
HKEY_LOCAL_MACHINE\Software\Policies |
HKEY_LOCAL_MACHINE\Security |
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services |
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\KnownDLLs |
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\winreg |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceEx |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\URL |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows |
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon |
HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components |
HKEY_LOCAL_MACHINE\Security\Policy\Secrets |
HKEY_LOCAL_MACHINE\Security\SAM\Domains\Account\Users \Enum$ |
|
C:\WINDOWS/Debug |
C:\WINDOWS/WindowsUpdate.log |
C:\WINDOWS/iis6.log |
C:\WINDOWS/system32/wbem/Logs |
C:\WINDOWS/system32/wbem/Repository |
C:\WINDOWS/Prefetch |
C:\WINDOWS/PCHEALTH/HELPCTR/DataColl |
C:\WINDOWS/SoftwareDistribution |
C:\WINDOWS/Temp |
C:\WINDOWS/system32/config |
C:\WINDOWS/system32/spool |
C:\WINDOWS/system32/CatRoot |
And you? What are you monitoring? Please share your configurations and tips!
Xavier Mertens
ISC Handler - Freelance Security Consultant
PGP Key
SOC Resources for System Management
I have recently started looking at the MITRE 10 strategies for a SOC (hxxps://www.mitre.org/sites/default/files/publications/pr-13-1028-mitre-10-strategies-cyber-ops-center.pdf). Strategy one in their doc is to consolidate the following under one management team: Tier 1 Analysis, Tier 2+, Trending & Intel, SOC System admin and SOC Engineering. This makes a lot of sense. But what do you do when you don’t have enough skilled people or positions to have a separate system admins and engineers?
My group has individuals assigned responsibilities to different products for patching, maintenance and operational optimization. The current problem I run into is that we get into an engineering mode where a large amount of time is spent deploying, patching or scripting things. While all these items need to be done, it reduces our IR bandwidth with backlogs. One strategy is to have the tier 2+ group alternate between weeks for engineering/maintenance. This will force them to better plan upgrades within that window or work on other assignments.
Long term plans should include additional positions that can be assigned the maintenance and engineering of systems What are other strategies being used by groups that maintain their systems, but without a dedicated resource to it? Please leave comments..
--
Tom Webb
Comments