Securing your Event logs

by Mitch Tulloch [Published on 7 June 2007 / Last Updated on 7 June 2007]

Preventing rogue administrators from tampering with Event logs.

Event logs can easily be tampered with if a user belongs to the local Administrators group on a system. For example, you can disable the Event Log service, reboot your machine, and mess around with the event log files. Or even easier, you can download a tool like WinZapper (see http://www.securityfocus.com/tools/1726) which will let you delete individual events from your event logs even while your system is still running!

How can you prevent rogue Administrators then from modifying event logs on your system? By consolidating the logs on your systems to a safe and secure central location. One great way for doing this is to use Audit Collection Services (ACS), a part of Microsoft System Center Operations Manager 2007, see http://technet.microsoft.com/en-us/library/bb381258.aspx for details. Archiving your centralized logs offline at a secure site will add even more security to this scenario.

Mitch Tulloch was lead author for the Windows Vista Resource Kit from Microsoft Press, which is THE book for IT pros who want to deploy, maintain and support Windows Vista in mid- and large-sized network environments. For more information see www.mtit.com.

See Also

Featured Links