- Что такое проектируемая файловая система Windows?
- 6 Configuring Recovery Manager and Archiving
- Overview of Configuring RMAN for Oracle RAC
- Archiving Mode in Oracle RAC
- Configuring the RMAN Snapshot Control File Location
- Configuring RMAN to Automatically Backup the Control File and SPFILE
- Crosschecking on Multiple Oracle RAC Nodes
- Configuring Channels for RMAN in Oracle RAC
- Configuring Channels to Use Automatic Load Balancing
- Configuring Channels to Use a Specific Node
- Managing Archived Redo Logs Using RMAN in Oracle RAC
- Archived Redo Log File Conventions in Oracle RAC
- Complete Guide to Windows File System Auditing
- Why is Windows File System Auditing Important?
- How to Enable Windows File System Auditing
- Step 1: Enable Audit Policy
- Step 2: Apply Audit Policy to Files and/or Folders
- Step 3: Open Event Viewer
- Windows File System Auditing Scenarios
- How to Track Who Read a File on Windows File Server
- How to Track Who Changed a with Windows File Auditing
- How to Detect Who Deleted a File From Your Windows File Servers
- The Windows File Activity Audit Flow
- Interpreting File System Accesses
- Windows Event Log Limitations for File System Auditing
- Consider Scalability When Collecting Windows File Activity
- Windows File System Auditing With Varonis
Что такое проектируемая файловая система Windows?
В последних сборках Windows 10 в бета-версии появилась новая функция, называемая Windows Projected File System. Я не могу найти в Google никакой информации, кроме API-интерфейсов программирования, которые не имеют смысла для меня.
Что это такое, и на каких пользователей он будет нацелен?
Проецируемая файловая система, также известная как ProjFS, — это функция, похожая на FUSE в Linux (или Dokan & WinFSP). Это позволяет приложениям создавать виртуальные файловые системы, которые кажутся неотличимыми от локальных папок, но все их содержимое генерируется программой «вживую». (Другими словами, вы видите проекции файлов, которых там может не быть.)
Основное использование ProjFS — Microsoft Git Virtual File System , дополнение к инструменту управления версиями Git, направленное на повышение его производительности и уменьшение использования дискового пространства при работе с массивными репозиториями. (Git был создан для репозиториев, содержащих только десятки тысяч файлов, таких как Linux.git; но Microsoft начала использовать его внутри для исходного хранилища Windows, которое на несколько порядков больше).
В настоящее время ProjFS, похоже, не документирована публично, но я ожидаю, что рано или поздно сторонние разработчики выяснят, как использовать его в качестве альтернативы FUSE для реализации таких виртуальных файловых систем, как sshfs , ftpfs и так далее.
Примечание: Pro J ected Файловая система не имеет ничего общего с Windows File Pro т перегиба.
Как отмечено в комментариях, документация теперь доступна для этой функции.
6 Configuring Recovery Manager and Archiving
This chapter explains how to configure Recovery Manager (RMAN) for use in Oracle Real Application Clusters (Oracle RAC) environments. This chapter also provides procedures for using for archiving in Oracle RAC environments and discusses online redo log and archived redo log considerations.
The topics in this chapter include:
Overview of Configuring RMAN for Oracle RAC
RMAN enables you to back up, restore, and recover data files, control files, server parameter files (SPFILEs) and archived redo log files. RMAN is included with Oracle Database and does not require separate installation. You can run RMAN from the command line or use RMAN in the Backup Manager in Oracle Enterprise Manager.
Archiving Mode in Oracle RAC
In order for redo log files to be archived, the Oracle RAC database must be in ARCHIVELOG mode. You can run the ALTER DATABASE SQL statement to change the archiving mode in Oracle RAC, because the database is mounted by the local instance but not open in any instances. You do not need to modify parameter settings to run this statement.
The ARCHIVELOG mode is set at the database level, not the instance level. Either all instances archive or none do.
You can also change the archive log mode by using the Recovery Settings page in the Maintenance tab of the Oracle Enterprise Manager Oracle RAC Database Home Page.
Oracle Database Administrator’s Guide for more information about setting the archiving mode
Configuring the RMAN Snapshot Control File Location
The snapshot control file is a copy of a database control file created in an operating system-specific location by RMAN. RMAN creates the snapshot control file so that it has a consistent version of a control file to use when either resynchronizing the recovery catalog or backing up the control file.
You can specify a cluster file system or a raw device destination for the location of your snapshot control file. This file is shared across all nodes in the cluster and must be accessible by all nodes in the cluster. Run the following RMAN command to determine the configured location of the snapshot control file:
You can change the configured location of the snapshot control file. For example, on Linux and UNIX systems you can specify the snapshot control file location as $ORACLE_HOME/dbs/scf/snap_prod.cf by entering the following at the RMAN prompt:
This command sets the configuration for the location of the snapshot control file for every instance of your cluster database . Therefore, ensure that the directory $ORACLE_HOME/dbs/scf exists on all nodes that perform backups.
The CONFIGURE command creates persistent settings across RMAN sessions. Therefore, you do not need to run this command again unless you want to change the location of the snapshot control file.
To delete a snapshot control file you must first change the snapshot control file location, then delete the file at the older location, as follows:
Oracle Database Backup and Recovery Reference for more information about configuring the snapshot control file
Configuring RMAN to Automatically Backup the Control File and SPFILE
If you set CONFIGURE CONTROLFILE AUTOBACKUP to ON , then RMAN automatically creates a control file and an SPFILE backup after you run the BACKUP or COPY commands. RMAN can also automatically restore an SPFILE, if this is required to start an instance to perform recovery, because the default location for the SPFILE must be available to all nodes in your Oracle RAC database.
These features are important in disaster recovery because RMAN can restore the control file even without a recovery catalog. RMAN can restore an autobackup of the control file even after the loss of both the recovery catalog and the current control file. You can change the default name that RMAN gives to this file with the CONFIGURE CONTROLFILE AUTOBACKUP FORMAT command. Note that if you specify an absolute path name in this command, then this path must exist identically on all nodes that participate in backups.
RMAN performs the control file autobackup on the first allocated channel. Therefore, when you allocate multiple channels with different parameters, especially when you allocate a channel with the CONNECT command, determine which channel will perform the control file autobackup. Always allocate the channel for this node first.
Besides using the RMAN control file, you can also use Oracle Enterprise Manager to use the RMAN features.
Oracle Database Backup and Recovery User’s Guide for more information about using the control file autobackup feature
Crosschecking on Multiple Oracle RAC Nodes
When crosschecking on multiple nodes (and when operating RMAN in general), configure the cluster so that all backups can be accessed by every node, regardless of which node created the backup. When the cluster is configured this way, you can allocate channels to any node in the cluster during restore or crosscheck operations.
If you cannot configure the cluster so that each node can access all backups, then during restore and crosscheck operations, you must allocate channels on multiple nodes by providing the CONNECT option to the CONFIGURE CHANNEL command, so that every backup can be accessed by at least one node. If some backups are not accessible during crosscheck because no channel was configured on the node that can access those backups, then those backups are marked EXPIRED in the RMAN repository after the crosscheck.
For example, you can use CONFIGURE CHANNEL . CONNECT in an Oracle RAC configuration in which tape backups are created on various nodes in the cluster and each backup is only accessible on the node on which it is created. This is described in more detail in «Configuring Channels to Use a Specific Node».
Configuring Channels for RMAN in Oracle RAC
This section describes how to configure channels for RMAN. You can configure channels to use automatic load balancing or you can specify specific channels for specific instances as described in the following topics:
Configuring Channels to Use Automatic Load Balancing
To configure channels to use automatic load balancing, use the following syntax:
Where number_of_channels is the number of channels that you want to use for the operation. After you complete this one-time configuration, you can issue BACKUP or RESTORE commands.
Configuring Channels to Use a Specific Node
To configure one RMAN channel for each policy-managed Oracle RAC database instance, use the following syntax:
After this one-time configuration step, you can issue the BACKUP or RESTORE commands.
Managing Archived Redo Logs Using RMAN in Oracle RAC
When a node generates an archived redo log, Oracle Database always records the filename of the log in the control file of the target database. If you are using a recovery catalog, then RMAN also records the archived redo log filenames in the recovery catalog when a resynchronization occurs.
The archived redo log naming scheme that you use is important because when a node writes to a log with a specific file name on its file system, the file must be readable by any node that must access this archived redo log. For example, if node1 archives a log to /oracle/arc_dest/log_1_100_23452345.arc , then node2 can back up this archived redo log only if it can read /oracle/arc_dest/log_1_100_23452345.arc on its own file system.
The backup and recovery strategy that you choose depends on how you configure the archiving destinations for each node. Whether only one node or all nodes perform archived redo log backups, you must ensure that all archived redo logs are backed up. If you use RMAN parallelism during recovery, then the node that performs recovery must have read access to all archived redo logs in your cluster.
Multiple nodes can restore archived logs in parallel. However, during recovery, only one node applies the archived logs. Therefore, the node that is performing the recovery must be able to access all of the archived logs that are needed for the recovery operation. By default, the database determines the optimum number of parallel threads to use during the recovery operation. You can use the PARALLEL clause in the RECOVER command to change the number of parallel threads.
Guidelines and Considerations for Archived Redo Logs
The primary consideration is to ensure that all archived redo logs can be read from every node during recovery, and, if possible, during backups. During recovery, if the archived log destinations are visible from the node that performs the recovery, then Oracle Database can successfully recover the archived log data.
Archived Redo Log File Conventions in Oracle RAC
For any archived redo log configuration, uniquely identify the archived redo logs with the LOG_ARCHIVE_FORMAT parameter. The format of this parameter is operating system-specific and it can include text strings, one or more variables, and a filename extension.
Table 6-1 Archived Redo Log File Name Format Parameters
Complete Guide to Windows File System Auditing
Inside Out Security Blog » Data Security » Complete Guide to Windows File System Auditing
Windows file system auditing is an important tool to keep in your cybersecurity forensics toolbox.
Read on to learn more about file system auditing on Windows, and why you will need an alternative solution to get usable file audit data.
Why is Windows File System Auditing Important?
When you experience a cyberattack – it’s no longer an if – you have to be able to pinpoint exactly what the attacker viewed, changed, or stole. This kind of insight requires a complete file system auditing system.
File system auditing is a requirement for any modern data security strategy, but file analysis is the better alternative. File analysis processes and normalizes the raw file audit data so you can use the information easier. A comprehensive file analysis log will show you what data an attacker or malicious insider tried or succeeded in accessing and stealing.
How to Enable Windows File System Auditing
Step 1: Enable Audit Policy
First, go to the Domain Controller (DC) and update the Group Policy (GPO) to enable file auditing.
Right click on the Group Policy you want to update or create a new GPO for file auditing. In the right-click menu, select edit to go to the Group Policy Editor .
*I created a new GPO called “File Auditing” for the purposes of this example.
In the Group Policy editor, click through to Computer Configuration -> Policies -> Windows Settings -> Local Policies. Click on Audit Policy.
You can add many auditing options to your Windows Event Log. The option for file auditing is the “Audit object access” option.
Double-click “Audit object access” and set it to both success and failure.
To enable your new GPO, go to a command line and run ‘gpupdate /force’.
Verify that your policy is set correctly with the command ‘gpresult /r’ on the computer that you want to audit.
Step 2: Apply Audit Policy to Files and/or Folders
Next, tell Windows exactly which files and/or folders that you want to audit. Here is the procedure to set auditing up for your folders.
- Right-click the file or folder in Windows Explorer. Select Properties .
- Change to the Security tab and click Advanced.
- Click the Auditing tab and then Continue.
- Add the Users or Groups that you want to audit and check all of the appropriate boxes.
Step 3: Open Event Viewer
Once you have enabled the Auditing GPO and set the file/folder auditing, you will see audit events in the Security Event Log in Windows Event Viewer.
But what does that information mean to an IR team that is trying to figure out what happened during the latest cyberattack? Let’s dig into what these event log messages actually tell us.
Windows File System Auditing Scenarios
Read on to learn more about different auditing situations including who read, edited or deleted a given file.
How to Track Who Read a File on Windows File Server
Finding who opened a file in the Windows audit is straightforward. Simply look for event ID 4663. Every Windows Event Log entry has an event ID, which describes what happened during that event. ID 4663 means that an “Attempt was made to access an object.” You will see a success or failure message as part of the event, the name of the file or object, as well as the user and process that made the access attempt.
In the above screenshot, the itadmin user read the file “test – Copy.txt.”
How to Track Who Changed a with Windows File Auditing
In Windows File Auditing, you don’t know if the file got changed or not. You can tell when a file got opened, and what process opened that file.
What we can see from this event ID 4663 is that itadmin opened the file “Editing this file.txt” in notepad, and we can assume that this file got changed.
How to Detect Who Deleted a File From Your Windows File Servers
Delete events in the Windows Event Log are event ID 4660. You can see an example of a delete operation here:
Your first question is probably, “What file got deleted?” To find out, we have to dig into the Event Log to find a corresponding event ID 4663.
Looking at the timestamps of the two events, you can deduce that the file deleted was ‘test- Copy.txt’.
The Windows File Activity Audit Flow
Windows does not log file activity at the high level we expect and need for forensic investigation. Instead, it logs granular file operations that require further processing.
The diagram below outlines how Windows logs each file operation using multiple event log entries:
The delete operation is a unique case in that there is a fourth event, 4660, mentioned above. The sequence is identified by the “Handle ID” event property, which is unique to this sequence (at least until a reboot).
The event that provides the most information is 4663, identifying that an attempt was made to access an object. However, the name is misleading because Windows only issues the event when the operation is complete. In reality, there might be multiple 4663 events for a single handle, logging smaller operations that make up the overall action. For example, a rename involves a read, delete, and a write operation. Also, a single 4663 event might include multiple values in the “Accesses” property which lists access rights exercised to perform the operation. Those “Accesses” serve as our guideline for the operations themselves.
The following table provides more information about each event:
Event ID | Name | Description | Data It Provides |
4656 | A handle to an object was requested | Logs the start of every file activity but does not guarantee that it succeeded | The name of the file |
4663 | An attempt was made to access an object | Logs the specific micro operations performed as part of the activity | What exactly was done |
4660 | An object was deleted | Logs a delete operation | The only way to verify an activity is actually a delete |
4658 | The handle to an object was closed | Logs the end of a file activity | How much time it took |
When we ask ourselves the question “who touched my files?”, the Windows Audit Log is going to have at least four different event log entries per file read that we need to filter through and correlate before we can make any quality forensic conclusions.
Interpreting File System Accesses
To identify the actual action, decode the exercised permissions as reported in the “Accesses” event property. Unfortunately, this is not a one-to-one mapping. Each file action includes many smaller operations that Windows performs, and those smaller operations are the ones logged.
The more important “Accesses” property values are:
- “WriteData” implies that a file was created or modified unless deleted
- “ReadData” is logged as part of practically any action. It implies “Access” if no “Delete” or “WriteData” is logged for the same handle and for the same file name around the same time.
- “Delete” may signify many things: delete, rename (same folder), move (to a different folder) or recycled, which is essentially a move to the recycle bin. Event 4660 with the same handle differentiate between delete or recycled for which a 4660 event is issued and a rename or move for which it is not.
Consider this only as a starting point. The analysis above is extremely simplified, and real-world implementation will require more research. Some areas for further research are:
- Differentiating delete from send to recycling bin and move from rename.
- Analyzing attributes access (with or without other access operations).
- Handling event 4659, which is similar to 4660 but is logged on a request to delete a locked file on the next reboot rather than deleting them now.
- Researchingreports that events come out of order and the “request handle event” (4656) may not be the first in the sequence.
You may want to review this PowerShell Script which reads Windows events and generates from them meaningful file activity report to get a somewhat less simplified analysis.
Pro tip: Varonis has been auditing Windows file servers at petabyte scale for over a decade, with numerous patents related to normalization and analysis. Give it a try to save yourself time figuring out how to parse raw logs .
Windows Event Log Limitations for File System Auditing
While the Windows file activity events seem comprehensive, there are things that cannot be determined using only the event log. A few examples are:
- Create vs. modify : the only way to know if this is a new file or a modified file is to know the prior state, i.e., whether the file existed before.
- Missing information on failures : For cybersecurity, it can be important to know when someone failed to access a file. Windows file auditing only writes a single event ID 4656 for failures to access due to permissions.
- Cut & paste : while one would assume “cut and paste” would be similar to a move operation, in practice, the behavior seems to be similar to a delete operation followed by a create operation with no relations whatsoever between the two operations.
Consider Scalability When Collecting Windows File Activity
If you are going to use the native Windows file auditing, you need to be aware of how much data you are going to collect. Collecting Windows file activity is a massive event flow and the Microsoft event structure, generating many events for a single file action, does not help. Such a collection will require more network bandwidth to transfer events and more storage to keep them. Furthermore, the sophisticated logic required may need a powerful processing unit and a lot of memory.
To reduce the overhead, you may want to:
- Carefully select which files you monitor based on the scenario you plan to implement. For example, you may want to track only system files or shares that include sensitive data.
- Limit collection of unneeded events at the source. If your collection infrastructure uses Microsoft Event Forwarding, you can build sophisticated filters based on event IDs and event properties. In our case, filter only events 4656, 4660, 4663 and optionally 4658 and only for the “Accesses” values needed.
- Limit event storage and event sizes as raw Windows events are sizable.
Windows File System Auditing With Varonis
Varonis records file activity with minimal server and network overhead – enabling better data protection, threat detection, and forensics. An alternative approach for implementing this important security and compliance measure is to use a lightweight agent on each monitored Windows system with a focus on file servers .
Varonis processes Windows file activity and translates those events into audit data that you can actually use and understand, and can handle many millions of events per hour on the largest file servers.
Keep in mind that each one of those events in the native Windows auditing would be at least four entries, and all mixed in with all of the other logon and ticket authorization events in the Security Event Log. With Varonis, you can easily filter your search in Event Viewer by user, file server, or folder path.
From a data protection perspective, Windows file auditing isn’t fast enough to audit a significant incident like a ransomware attack. You can’t immediately open the Windows Event Log and see every file or folder the ransomware attacked. Each moment you waste trying to discover which accounts triggered the ransomware, more files might get encrypted.
Varonis does that file event correlation for you so you can quickly filter and view the files and folders affected by the ransomware. You can export a report of the ransomware incident so you can begin the cleanup and recovery process immediately. Varonis can even trigger an immediate response to a suspected ransomware attack to disable the attack in progress.
Check out the Live Cyber Attack Workshop to see how Varonis turns basic file auditing into intelligent alerts that you can use in real life situations.
Jeff has been working on computers since his Dad brought home an IBM PC 8086 with dual disk drives. Researching and writing about data security is his dream job.