Hitachi Activity Auditing Configuration
The Hitachi NAS (HNAS) server can host multiple Enterprise Virtual Servers (EVS). Each EVS has multiple file systems. Auditing is enabled and configured per file system. This guide explains how to enable auditing on an HNAS and to configure the Activity Monitor to monitor activity coming from the Hitachi device auditing.
The Activity Monitor does not use the EVS or file system name to connect to HNAS. Therefore, all that is required of the user for HNAS activity collection is the following:
-
Logs path (UNC)
- Active Log file name – Active Log File name needs with an
.evt
extension, and it should be the same as in the HNAS configuration. This is usuallyaudit.evt
.
- Active Log file name – Active Log File name needs with an
-
Credentials to access the HNAS log files
- The only requirement for the credentials is the ability to read files from the
logs
directory.
- The only requirement for the credentials is the ability to read files from the
-
A polling interval between log collections (15 seconds by default)
- The Activity Monitor minimizes IO by remembering a file offset where it stopped reading and continuing from that offset next time.
CAUTION: The following disclaimer is provided by Hitachi:
“Because CIFS defines open and close operations, auditing file system object access performed by clients using other protocols would be costly in terms of system performance, because each I/O operation would have to be audited as an open operation. Therefore, when file system auditing is enabled, by default, only clients connecting through the CIFS protocol are allowed access to the file system. Access by clients using other protocols, like NFS, can, however, be allowed. When such access is allowed, access to file system objects through these protocols is not audited.”
NOTE: File system auditing can be configured to deny access to clients connecting with protocols that cannot be audited (NFS). Please see the Hitachi Server and Cluster Administration Guide for additional information.
Configuration Checklist
Complete the following checklist prior to configuring activity monitoring of Hitachi devices. Instructions for each item of the checklist are detailed within the following topics.
Checklist Item 1: Configure Audit Logs on HNAS
Checklist Item 2: Configure Access to HNAS Audit Logs on Activity Agent Server
Checklist Item 3: Activity Monitor Configuration
- Deploy the Activity Monitor Activity Agent to a Windows proxy server
Configure Access to HNAS Audit Logs on Activity Agent Server
Follow the steps to configure access to the HNAS audit logs on the Windows server hosting the Activity Monitor activity agent.
Step 1 – On the Windows computer, go to Run and type compmgmt.msc
.
Step 2 – In the right-hand panel, select More Actions > Connect to another computer.
Step 3 – In the Select Computer dialog box, enter the IP Address for EVS for HNAS and then click OK.
Step 4 – In the Computer Management window, go to Computer Management > System tools > Shared Folders > Shares.
Step 5 – Select the Security tab and click Advanced.
Step 6 – In the Advanced Security Settings dialog box, select the Audit tab. Click Add or Edit to select the users and groups to be audited and add the desired user or group.
Step 7 – Select All for Type, and Full Control for Basic permissions.
Once access has been configured on both the Hitachi device and the Activity Agent server, it is time to configure and enable monitoring with the Activity Monitor Console.
Configure Audit Logs on HNAS
Follow the steps to configure access to the HNAS audit logs on the Hitachi device.
Step 1 – Open a browser and enter the IP Address for HNAS in the address bar to launch the Hitachi Storage Navigator (SN). Enter the username and password.
Step 2 – At the Storage Navigator home page, click File Services.
Step 3 – On the File Services screen, click Enable File Service.
Step 4 – On the Enable File Services screen, verify that the CIFS/Windows service is selected.
Step 5 – On the File Services screen, click File System Security.
Step 6 – Click Switch Mode and set the default file system security mode to Mixed (Windows and UNIX) for all virtual file systems.
Step 7 – Configure the Hitachi NAS Platform audit policy by returning to the File Services page.
Step 8 – Click File System Audit Policies.
Step 9 – Select the correct EVS and click details for the file system to enable auditing.
Step 10 – In the Access via Unsupported Protocols section, select Allow Access (without auditing). In the Audit Log section, set the maximum log file size to a value of at least 8 MB. It is recommended to set it to 16 MB. In the Log roll over policy section, select New. The product does not support the Wrap policy. Click OK to close.
Once access has been configured on the Hitachi device, it is necessary to configure access to the HNAS audit logs on the Windows server. See the Configure Access to HNAS Audit Logs on Activity Agent Server topic for additional information.
Hitachi Target Requirements
Netwrix Enterprise Auditor can execute Access Auditing (FSAA) and/or Sensitive Data Discovery Auditing scans on Hitachi devices. The Netwrix Activity Monitor can be configured to monitor activity on Hitachi devices and make the event data available for Enterprise Auditor Activity Auditing (FSAC) scans.
Access & Sensitive Data Auditing Permissions
The credentials used by the Enterprise Auditor scans must have the following permissions on the target host:
- Group membership in the Backup Operators local group
This permission grants the credential read access to all target folders and files. The credential used within the assigned Connection Profile for these target hosts requires these permissions.
NOTE: These permissions are in addition to those needed to either deploy applet scans for running scans in proxy mode with applet or installing the File System Proxy Service Permissions for running scans in proxy mode as a service. See the File System Scan Options topic for additional information.
Access & Sensitive Data Auditing Port Requirements
The firewall ports required by Enterprise Auditor for Access Auditing (FSAA) and/or Sensitive Data Discovery Auditing scans are based on the File System scan mode to be used. See the File System Scan Options topic for additional information.
Activity Auditing Permissions
Windows Proxy Server for Activity Agent Monitoring of Hitachi
The Netwrix Activity Monitor must have an Activity Agent deployed on a Windows proxy server. While actively monitoring, the Activity Agent generates activity log files stored on the proxy server. The credential used to deploy the Activity Agent must have the following permissions on the proxy server:
- Membership in the local Administrators group
- READ and WRITE access to the archive location for Archiving feature only
It is also necessary to enable the Remote Registry Service on the Activity Agent server.
For integration between the Activity Monitor and Enterprise Auditor, the credential used by Enterprise Auditor to read the activity log files must have also have this permission.
Hitachi Requirements
A Hitachi device can host multiple Enterprise Virtual Servers (EVS). Each EVS has multiple file systems. Auditing is enabled and configured per file system. HNAS generates the audit log files in EVT format (a standard event log format in Windows XP/2003 and earlier). Hitachi stores the generated audit logs in a user specified location on the file system. The activity agent deployed on the Windows proxy server accesses this location to collect the audit log files as they are generated. The credential used to monitor activity must be provisioned with:
- Capability of enabling a File System Audit Policy on the Hitachi device
- Audit rights to the Hitachi log directory
See the Hitachi Activity Auditing Configuration topic for instructions.
Activity Monitor Archive Location
If the activity log files are being archived, configurable within the Netwrix Activity Monitor Console, then the credential used by Enterprise Auditor to read the activity log files must also have READ and WRITE permissions on the archive location.
Activity Auditing Port Requirements
Firewall settings depend on the type of environment being targeted. The following firewall settings are required for communication between the Agent server and the Netwrix Activity Monitor Console:
Communication Direction | Protocol | Ports | Description |
---|---|---|---|
Activity Monitor to Agent Server | TCP | 4498 | Agent Communication |
The Windows firewall rules need to be configured on the Windows server, which require certain inbound rules be created if the scans are running in applet mode. These scans operate over a default port range, which cannot be specified via an inbound rule. For more information, see the Microsoft Connecting to WMI on a Remote Computer article.
Additional Firewall Rules for Integration between Enterprise Auditor and Activity Monitor
Firewall settings are dependent upon the type of environment being targeted. The following firewall settings are required for communication between the agent server and the Enterprise Auditor Console:
Communication Direction | Protocol | Ports | Description |
---|---|---|---|
Enterprise Auditor to Agent Server | TCP | 445 | SMB, used for Agent Deployment |
Enterprise Auditor to Agent Server | TCP | Predefined | WMI, used for Agent Deployment |