Skip to content

Commit 61b85ae

Browse files
committed
fixed broken build
2 parents 98f0cd2 + 5c68ccc commit 61b85ae

File tree

3 files changed

+17
-28
lines changed

3 files changed

+17
-28
lines changed

.claude/settings.json

Lines changed: 0 additions & 27 deletions
This file was deleted.
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# Configure IT Infrastructure for Auditing and Monitoring
2+
3+
You can configure your IT Infrastructure for monitoring in one of the following ways:
4+
5+
- Automatically when creating an organization. This is a recommended method.
6+
- Manually. The table below lists the native audit settings that must be adjusted manually to ensure
7+
collecting comprehensive and reliable audit data. You can enable Netwrix 1Secure to continually
8+
enforce the relevant audit policies or configure them manually.
9+
10+
| Data source | Provided connectors | Required configuration |
11+
| ----------------- | --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
12+
| Active Directory | Active Directory Activity | In the audited environment: See [Configure Domain for Monitoring Active Directory](/docs/1secure/setup-and-configuration/active-directory/manual-configuration.md) for related settings and procedures. On the computer where Netwrix Cloud Agent is installed: - If you have enabled automatic log backup for the Security log of your domain controller, you can instruct Netwrix 1Secure to clear the old backups automatically. For that, use the **CleanAutoBackupLogs** registry key It is recommended that you adjust retention period for the backup files accordingly (default is **50** hours). - To provide for event data collection, the Secondary Logon service must be up and running . Open **Administrative Tools****Services**, right-click the **Secondary Logon** service and on the **General** tab make sure that **Startup type** for this service is other than _Disabled_. |
13+
| Active Directory | Active Directory Logons | In the audited environment: - The following policies must be set to _"Success"_ and _"Failure"_ for the effective domain controllers policy: - Audit Logon Events - Audit Account Logon Events - The Audit system events policy must be set to _"Success"_ for the effective domain controllers policy. - The Advanced audit policy settings can be configured instead of basic. - The Maximum Security event log size must be set to 4GB. The retention method of the Security event log must be set to _“Overwrite events as needed”_ or _"Archive the log when full"_. - The following Windows Firewall inbound rules must be enabled: - Remote Event Log Management (NP-In) - Remote Event Log Management (RPC) - Remote Event Log Management (RPC-EPMAP) |
14+
| Azure AD | Azure AD Activity Azure AD Logons | No special settings are required. Remember to do the following: Configure Azure AD app as described in [App Registration and Configuration in Microsoft Entra ID](/docs/1secure/setup-and-configuration/azure-entra-id/registration.md) section. |
15+
| Computer | File Server Activity | **In the audited environment** - For a security principal (e.g., Everyone), the following options must be configured in the Advanced Security → Auditing settings for the audited shared folders: <br />- List Folder / Read Data (Files only): _"Success"_ and _"Fail"_<br />- List Folder / Read Data (This folder, subfolders and files): _"Fail"_<br />- Create Files / Write Data\* : _"Success"_ and _"Fail"_<br />- Create Folders / Append Data\* : _"Success"_ and _"Fail"_ <br />- Write Extended Attributes\* : _"Success"_ and _"Fail"_<br />- Delete Subfolders and Files\* : _"Success"_ and _"Fail"_<br />- Delete\* : _"Success"_ and _"Fail"_<br />- Change Permissions\* : _"Success"_ and _"Fail"_<br />- Take Ownership\* : _"Success"_ and _"Fail"_<br />- Select _"Fail_" only if you want to track failure events, it is not required for success events monitoring. If you want to get only state-in-time snapshots of your system configuration, limit your settings to the permissions marked with \* and set it to _"Success"_ (Apply onto: This folder, subfolders and files).<br /><br />The following Advanced audit policy settings must be configured:<br />- The Audit: Force audit policy subcategory settings (Windows 7 or later) security option must be enabled.<br />- Depending on your OS version, configure the categories as follows:<br /> - Windows Server 2008:<br /> - Object Access; Audit File Share _"Success"_ ; Audit File System _"Success"_ and _"Failure"_ ; Audit Handle Manipulation _"Success"_ and _"Failure"_ ; Logon/Logoff ; Logon _"Success"_ ; Logoff _"Success"_ ;<br /> - Policy Change: Audit Audit Policy Change: _"Success"_<br /> - System: Security State Change: _"Success"_<br /> - Windows Server 2008 R2 / Windows 7 and above<br /> - Object Access:<br /> - Audit File Share: _"Success"_<br /> - Audit File System: _"Success"_ and _"Failure"_<br /> - Audit Handle Manipulation: _"Success"_ and _"Failure"_<br /> - Audit Detailed file share: _"Failure"_<br /> - Logon/Logoff:<br /> - Logon: _"Success"_<br /> - Logoff: _"Success"_<br /> - Policy Change:<br /> - Audit Audit Policy Change: _"Success"_<br /> - System:<br /> - Security State Change: _"Success"_<br /> - If you want to get only state-in-time snapshots of your system configuration, limit your audit settings to the following policies:<br /> - Object Access:<br /> - Audit File System: _"Success"_<br /> - Audit Handle Manipulation: "Success"<br /> - Audit File Share: "Success"<br /> - Policy Change:<br /> - Audit Audit Policy Change: "Success"<br /> - The following legacy policies can be configured instead of advanced:<br /> - Audit object access policy must set to _"Success"_ and _"Failure"_.<br /> - Audit logon events policy must be set to _"Success"_.<br /> - Audit system events policy must be set to _"Success"_.<br /> - Audit policy change must be set to _"Success"_.<br /> - The Security event log maximum size must be set to 4GB.<br /> - The retention method of the Security event log must be set to _“Overwrite events as needed”_.<br /> - The Remote Registry service must be started.<br /> - The following inbound Firewall rules must be enabled:<br /> - Remote Event Log Management (NP-In)\*<br /> - Remote Event Log Management (RPC)\*<br /> - Remote Event Log Management (RPC-EPMAP)\*<br /> - Windows Management Instrumentation (ASync-In)<br /> - Windows Management Instrumentation (DCOM-In)<br /> - Windows Management Instrumentation (WMI-In)<br /> - Network Discovery (NB-Name-In)<br /> - File and Printer Sharing (NB-Name-In)<br /> - File and Printer Sharing (Echo Request - ICMPv4-In)<br /> - File and Printer Sharing (Echo Request - ICMPv6-In)<br /> - The rules marked with \* are required only if you do not want to use network traffic compression for auditing.<br /> - If you plan to audit Windows Server 2019 or Windows 10 Update 1803 without network compression service, make sure the following inbound connection rules are enabled:<br /> - Remote Scheduled Tasks Management (RPC)<br /> - Remote Scheduled Tasks Management (RPC-EMAP) |
16+
| SharePoint Online | SharePoint Online Activity | No special settings are required. Remember to do the following: Configure Azure AD app as described in [App Registration and Configuration in Microsoft Entra ID](/docs/1secure/setup-and-configuration/azure-entra-id/registration.md).|

docs/directorymanager/11.1/gettingstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ To get started with Directory Manager, it would be helpful to get an understandi
1313
- Compatible devices and browsers
1414
- Supported languages
1515

16-
## Clients
16+
## Clients
1717

1818
The Directory Manager application comprises of the following main modules or clients:
1919

0 commit comments

Comments
 (0)