SlideShare une entreprise Scribd logo
1  sur  13
1
User Activity & File Access Monitoring
© 2013, SolarWinds Worldwide, LLC. All rights reserved.
SolarWinds Log & Event Manager
2
Monitoring User Activity & File Access
» With real-time log analysis, SolarWinds Log & Event Manager (LEM)
provides crucial visibility into a user's behavior on the network,
including web usage, application usage, file access and more.
» LEM enables admins to easily identify anomalous patterns,
unauthorized access, and malicious activity.
» Additionally, LEM provides automated responses to instantly
remediate a security threat or network problem.
SOLARWINDS LOG & EVENT MANAGER
3
Example Scenario 1: User Logon Attempts
While it may not seem intuitive to monitor successful logon
attempts, you may want to keep an eye out for a successful logon
after multiple failed attempts or logons occurring after hours, both of
which could signal a breach.
SOLARWINDS LOG & EVENT MANAGER
EXAMPLE:
If there are 50 failed attempts on a server or router followed by a
successful logon, does it imply that the user simply remembered
their credentials? Or does it mean that a hacker finally broke in and
now has access?
LEM can monitor user logons and provide the necessary correlation
to identify a threat vs. normal, everyday user activity. Very
importantly, it does so in real-time. If a threat is detected, LEM can
then instantly and automatically log the user off.
4
Example Scenario 2: Privileged User Access
Elevated privileges are required by some users to do their job (i.e.
network admins, helpdesk support, HR, and Accounting to name a few),
but such privileged access can lead to security threats.
SOLARWINDS LOG & EVENT MANAGER
EXAMPLE:
A database administrator in charge of maintaining the company’s CRM
database starts accessing the HR database containing employees’
confidential data. Is this authorized? Malicious? Regardless, it’s out of
the ordinary for this user’s role and typical file access.
LEM can monitor file access and then correlate the event data to
determine if this is anomalous behavior. So, even though the database
administrator has access, it goes against this user’s typical pattern of
only accessing the CRM database. LEM can then automatically disable
the account or remove the user from a trusted group.
5
Default User Activity Rules
SOLARWINDS LOG & EVENT MANAGER
LEM delivers out-of-the-box activity rules for monitoring key User
actions that could pose a risk to the network.
6
Default File Auditing Reports
SOLARWINDS LOG & EVENT MANAGER
LEM provides real-time and historical visibility into file activity.
Whether it’s notification of inappropriate file access or searching for
the person who deleted an important document, LEM provides quick
and easy access to the event data that reflects file behavior and is
essential for protecting sensitive information.
7
Available User-Based Active Responses
SOLARWINDS LOG & EVENT MANAGER
SolarWinds LEM then goes a step further by providing built-in Active
Responses to automatically respond to a threat, such as logging off a
suspicious user or removing a user from a particular group.
8
Monitoring & Managing USB Device Access
» SolarWinds LEM includes built-in USB Defender technology that
provides real-time notification when USB drives are detected. This
notification can be further correlated with network logs to identify
potential malicious attacks coming from USB drives.
» With LEM’s USB Defender technology, you can take automated
actions such as disabling user accounts, quarantining workstations,
and automatically or manually ejecting USB devices.
» Additionally, LEM provides built-in reporting to audit USB usage
over time.
SOLARWINDS LOG & EVENT MANAGER
9
Adding Authorized USB Devices
» SolarWinds LEM addresses the complexity of providing USB access
to select USB devices with a few simple steps.
• Build a Group of “Authorized” USB Devices
• Identify “Authorized” Devices
• Add “Authorized” USB Devices to a User Defined Group
SOLARWINDS LOG & EVENT MANAGER
10
Adding Authorized USB Devices cont.
» Add the group of “Authorized” devices to SolarWinds LEM
rules using the simple drag-and-drop rule builder interface.
SOLARWINDS LOG & EVENT MANAGER
11
Automatically Detaching USB Devices
» With LEM’s Active Responses, you can automatically detach a USB
or mass storage device from a workstation. This action is useful for
allowing only specific devices to be attached to your Windows
computers or detaching any device exhibiting suspicious behavior,
such as:
• When a computer endpoint gains unauthorized USB access
• When an authorized USB port logs suspicious user activity
• When unwarranted data transfer happens between an
enterprise computer and USB drive
• When USB access on a USB port becomes non-compliant with
organizational policies
• When a USB endpoint is infected and needs to be quarantined
SOLARWINDS LOG & EVENT MANAGER
12
SolarWinds Log & Event Manager
 Log Collection, Analysis, and Real-Time
Correlation
 Collects log & event data from tens of
thousands of devices & performs true
real-time, in-memory correlation
 Powerful Active Response technology
enables you to quickly & automatically
take action against threats
 Advanced IT Search employs highly
effective data visualization tools –
word clouds, tree maps, & more
 Quickly generates compliance reports
for PCI DSS, GLBA, SOX, NERC CIP,
HIPAA, & more
 Built-in correlation rules, reports, &
responses for out-of-the-box visibility
and proactive threat protection
SOLARWINDS LOG & EVENT MANAGER
How can SolarWinds Log and Event Manager help?
13
Thank You!
SOLARWINDS LOG & EVENT MANAGER

Contenu connexe

Plus de SolarWinds

Plus de SolarWinds (20)

SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Monitoring User Activity and File Access

  • 1. 1 User Activity & File Access Monitoring © 2013, SolarWinds Worldwide, LLC. All rights reserved. SolarWinds Log & Event Manager
  • 2. 2 Monitoring User Activity & File Access » With real-time log analysis, SolarWinds Log & Event Manager (LEM) provides crucial visibility into a user's behavior on the network, including web usage, application usage, file access and more. » LEM enables admins to easily identify anomalous patterns, unauthorized access, and malicious activity. » Additionally, LEM provides automated responses to instantly remediate a security threat or network problem. SOLARWINDS LOG & EVENT MANAGER
  • 3. 3 Example Scenario 1: User Logon Attempts While it may not seem intuitive to monitor successful logon attempts, you may want to keep an eye out for a successful logon after multiple failed attempts or logons occurring after hours, both of which could signal a breach. SOLARWINDS LOG & EVENT MANAGER EXAMPLE: If there are 50 failed attempts on a server or router followed by a successful logon, does it imply that the user simply remembered their credentials? Or does it mean that a hacker finally broke in and now has access? LEM can monitor user logons and provide the necessary correlation to identify a threat vs. normal, everyday user activity. Very importantly, it does so in real-time. If a threat is detected, LEM can then instantly and automatically log the user off.
  • 4. 4 Example Scenario 2: Privileged User Access Elevated privileges are required by some users to do their job (i.e. network admins, helpdesk support, HR, and Accounting to name a few), but such privileged access can lead to security threats. SOLARWINDS LOG & EVENT MANAGER EXAMPLE: A database administrator in charge of maintaining the company’s CRM database starts accessing the HR database containing employees’ confidential data. Is this authorized? Malicious? Regardless, it’s out of the ordinary for this user’s role and typical file access. LEM can monitor file access and then correlate the event data to determine if this is anomalous behavior. So, even though the database administrator has access, it goes against this user’s typical pattern of only accessing the CRM database. LEM can then automatically disable the account or remove the user from a trusted group.
  • 5. 5 Default User Activity Rules SOLARWINDS LOG & EVENT MANAGER LEM delivers out-of-the-box activity rules for monitoring key User actions that could pose a risk to the network.
  • 6. 6 Default File Auditing Reports SOLARWINDS LOG & EVENT MANAGER LEM provides real-time and historical visibility into file activity. Whether it’s notification of inappropriate file access or searching for the person who deleted an important document, LEM provides quick and easy access to the event data that reflects file behavior and is essential for protecting sensitive information.
  • 7. 7 Available User-Based Active Responses SOLARWINDS LOG & EVENT MANAGER SolarWinds LEM then goes a step further by providing built-in Active Responses to automatically respond to a threat, such as logging off a suspicious user or removing a user from a particular group.
  • 8. 8 Monitoring & Managing USB Device Access » SolarWinds LEM includes built-in USB Defender technology that provides real-time notification when USB drives are detected. This notification can be further correlated with network logs to identify potential malicious attacks coming from USB drives. » With LEM’s USB Defender technology, you can take automated actions such as disabling user accounts, quarantining workstations, and automatically or manually ejecting USB devices. » Additionally, LEM provides built-in reporting to audit USB usage over time. SOLARWINDS LOG & EVENT MANAGER
  • 9. 9 Adding Authorized USB Devices » SolarWinds LEM addresses the complexity of providing USB access to select USB devices with a few simple steps. • Build a Group of “Authorized” USB Devices • Identify “Authorized” Devices • Add “Authorized” USB Devices to a User Defined Group SOLARWINDS LOG & EVENT MANAGER
  • 10. 10 Adding Authorized USB Devices cont. » Add the group of “Authorized” devices to SolarWinds LEM rules using the simple drag-and-drop rule builder interface. SOLARWINDS LOG & EVENT MANAGER
  • 11. 11 Automatically Detaching USB Devices » With LEM’s Active Responses, you can automatically detach a USB or mass storage device from a workstation. This action is useful for allowing only specific devices to be attached to your Windows computers or detaching any device exhibiting suspicious behavior, such as: • When a computer endpoint gains unauthorized USB access • When an authorized USB port logs suspicious user activity • When unwarranted data transfer happens between an enterprise computer and USB drive • When USB access on a USB port becomes non-compliant with organizational policies • When a USB endpoint is infected and needs to be quarantined SOLARWINDS LOG & EVENT MANAGER
  • 12. 12 SolarWinds Log & Event Manager  Log Collection, Analysis, and Real-Time Correlation  Collects log & event data from tens of thousands of devices & performs true real-time, in-memory correlation  Powerful Active Response technology enables you to quickly & automatically take action against threats  Advanced IT Search employs highly effective data visualization tools – word clouds, tree maps, & more  Quickly generates compliance reports for PCI DSS, GLBA, SOX, NERC CIP, HIPAA, & more  Built-in correlation rules, reports, & responses for out-of-the-box visibility and proactive threat protection SOLARWINDS LOG & EVENT MANAGER How can SolarWinds Log and Event Manager help?
  • 13. 13 Thank You! SOLARWINDS LOG & EVENT MANAGER