HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.150 Auditing of Novell Netware  4.x networks

S 2.150 Auditing of Novell Netware  4.x networks

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Auditors

One important technique of ensuring the security of a network is to allow independent auditors to check the events taking place in a network. For this purpose, Netware  4.x allows a large number of events to be tracked in the NDS and the file system through activation of an auditing function with the utility program named SYS:PUBLIC\AUDITCON.EXE. Netware  4.x permits any required number of users to be assigned the role of an auditor. This program offers the following functions, among others:

Note: If the logging function is activated, the log file can become very large. For this reason, a limit should be imposed on the maximum size of the file in order to prevent a shortage of memory. As the maximum size depends on the number of users and the activities they perform however, no fixed values can be specified here.

The data accumulated in this process is usually related to persons, and thus subject to the Federal Data Privacy Act. These data must only be used so as to ensure data privacy, maintain data backups and guarantee correct operation (also refer to S 2.110 Data privacy guidelines for logging procedures).

To configure an independent auditor who can check the activities of an administrator, but possesses no other administrative rights in the network, the following steps must be taken:

In Netware version 4.11 and higher, the information is stored in the NDS audit file objects. This considerably improves the security. In addition, there is much more scope for monitoring under Netware 4.11, as the number of auditing mechanisms and functions has been substantially increased. In Netware version 4.11 and higher, the auditor should be made independent from the administrator through the allocation of NDS rights. It can also be determined whether a particular auditor is allowed to view audit files and/or manage the auditing.

If, for carefully considered reasons, it is not desirable or possible to configure the role of an independent auditor, the log files can also be evaluated by the administrator. Should this be the case, it should be pointed out that the Administrator's activities are difficult to monitor. Consequently, the results of evaluation should be presented at least to the IT security officer, IT in-charge, or another specially appointed staff member.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home