SHAREPOINT ON-PREMISE CONFIGURATION 2021 - STEALTHBITS

Page created by Howard Weaver
 
CONTINUE READING
2021

SharePoint On-Premise Configuration
StealthAUDIT®
Stealthbits Activity Monitor®

                                             TOC
    SharePoint On-Premise Configuration Overview                                         4

         SharePoint Compatibility                                                        4

    StealthAUDIT SharePoint Scan Options                                                 6

         StealthAUDIT SharePoint Activity Auditing                                       6

         SharePoint Agent-Based Scans                                                    6

             Firewall Rules for Agent-Based Scans                                        8
             SharePoint Data Collection Configuration for Agent-Based Scans              9

         SharePoint Agent-Less Scans                                                    10

             Firewall Rules for Agent-Less Scans                                        11
             SharePoint Data Collection Configuration for Agent-Less Scans              12

    Activity Monitor Configuration                                                      14

         Activity Monitor Activity Agent Deployment                                     14

         Prepare for Activity Monitoring                                                15

         Monitored Host Configuration                                                   15

         Firewall Rules for Activity Monitoring                                         17

         StealthAUDIT Integration                                                       18

             Identify an Activity Log for StealthAUDIT                                  18
             StealthAUDIT Data Collection Configuration for SharePoint Activity Scans   19

         SIEM Integration                                                               20

    SharePoint On-Premise Configuration for Access Auditing                             22

         Configure SharePoint Farm Permissions                                          23

         Configure SharePoint Web Application Permissions                               24

         Configure SharePoint Database Server Permissions                               25

         Install the StealthAUDIT SharePoint Agent                                      25

    SharePoint On-Premise Configuration for Activity Monitoring                         27

         Enable Event Auditing on SharePoint 2013 through SharePoint 2019               27
Doc_ID 715                                                                                   2

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

    StealthAUDIT Connection Profile & Host List                                     28

         SharePoint On-Premises Custom Connection Profile                           28

         SharePoint Custom Host List                                                28

    More Information                                                                30

Doc_ID 715                                                                               3

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

     SharePoint On-Premise Configuration
                  Overview
 Stealthbits products audit and monitor Microsoft® SharePoint® environments. StealthAUDIT
 employs the SharePoint solution to execute Access Auditing (SPAA) and/or Sensitive Data
 Discovery Auditing scans against SharePoint on-premise. Through integration with the Activity
 Monitor, StealthAUDIT can also execute Activity Auditing (SPAC) scans against SharePoint on-
 premise environments. Additionally, the Activity Monitor can be configured to provide activity
 data to various SIEM products.

 This document describes the necessary settings in SharePoint to allow for successful use of:

 l   StealthAUDIT v11.5
 l   Stealthbits Activity Monitor v6.0

 If running Sensitive Data Discovery (SDD) scans, it will be necessary to increase the minimum
 amount of RAM on the server where the Add-on is installed. Each thread requires a minimum of 2
 additional GB of RAM per host. For example, if the job is configured to scan 8 hosts at a time,
 then an extra 16 GB of RAM are required (8x2=16).

 The sections of this document align to the products as follows:

 l   StealthAUDIT
     l   StealthAUDIT Scan Options
     l   Activity Monitoring for SharePoint
     l   SharePoint On-Premise Configuration for Access Auditing
     l   SharePoint On-Premise Configuration for Activity Auditing
     l   StealthAUDIT Connection Profile & Host List
 l   Stealthbits Activity Monitor
     l   Activity Monitoring for SharePoint
     l   SharePoint On-Premise Configuration for Activity Auditing

 SharePoint Compatibility
 StealthAUDIT for SharePoint is compatible with the following Microsoft® SharePoint®
 environments as targets:

Doc_ID 715                                                                                        4

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 l   SharePoint® 2019
 l   SharePoint® 2016
 l   SharePoint® 2013

Doc_ID 715                                                                          5

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 StealthAUDIT SharePoint Scan Options
 Required permissions on the targeted SharePoint environment are dependent upon not only the
 type of environment targeted but also the type of data collection scan being executed. There are
 two types of Access Auditing (SPAA) and/or Sensitive Data Discovery Auditing scans: agent-based
 and agent-less. The Activity Auditing (SPAC) scans can only be executed as agent-less scans from
 StealthAUDIT but require the Activity Monitor to have a activity agent deployed in the target
 environment.

 Agent-Based Type

 When StealthAUDIT SharePoint scans are run in agent-based mode, the StealthAUDIT SharePoint
 Agent must be installed on the SharePoint Application server which hosts the “Central
 Administration” component prior to executing the scans. This is typically the first server stood up
 during the SharePoint farm installation process in this mode. The data collection processing is
 conducted by the SharePoint Agent for the target environment. The final step in data collection is
 to transfer the data collected in the SQLite databases, or Tier 2 databases, on the StealthAUDIT
 SharePoint Agent server back to the StealthAUDIT Console server.

 NOTE: Agent-based scans can only target on-premise environments.

 Agent-Less Type

 When SharePoint agent-less scans are run, it means all of the data collection processing is
 conducted by the StealthAUDIT Console server across the network. Agent-less scans can target
 both on-premise and online environments.

 StealthAUDIT SharePoint Activity Auditing
 Specific permissions are necessary for Activity Auditing (SPAC) scans, which employ the Activity
 Monitor. These scans can only be executed as agent-less scans. See the Activity Monitor
 Configuration section for information.

 SharePoint Agent-Based Scans
 The StealthAUDIT SharePoint Agent is capable of auditing permissions and content, or Access
 Auditing (SPAA) and Sensitive Data Discovery Auditing, on SharePoint on-premise servers. It is
 installed on the SharePoint Application server which hosts the “Central Administration”
 component.

Doc_ID 715                                                                                          6

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 If limited provisioning of the service account is not required by the organization, then the
 following permissions are sufficient for successful agent-based scans:

 l   Membership in the local Administrator group on the on server where the StealthAUDIT
     SharePoint Agent is installed
     l   Only needed for agent installation
 l   SharePoint Application Server permissions:
     l   Local group membership to Backup Operators
     l   Local group membership to WSS_WPG
     l   Log on as a Service in the Local Security Policy
     l   Full Control on the agent install directory
         l   Example – C:\Program Files\STEALTHbits\StealthAUDIT\SPAA
 l   SharePoint Farm permissions:
     l   Membership in the Farm Read group at the farm level
         l   If the group does not exist already, then you will need to create a new group at that level
             and grant it ‘Read’ access. Specifically, it is a group that exists within Central
             Administration at the farm administrator level. This group only requires ‘Read’ access
             and is not giving farm admin access. Once the group is created, add the service account
             that StealthAUDIT will be leveraging to scan SharePoint.
 l   Web Application permissions:
     l   Custom Role with Site Collection Auditor at the web application level with the Open Items
         permission
 l   SharePoint Database Server permissions:
     l   For SharePoint 2013 through SharePoint 2019 – SPDataAccess on the on the SharePoint
         Content database and all Configuration databases
     NOTE: This permission should be applied on the desired Configuration database and all
     Content databases for the SharePoint version.
 l   DB_Owner on StealthAUDIT database if using Windows Authentication for the Storage Profile
 l   MySites permissions are based on the SharePointAccess Data Collection configuration option:
     l   Forcing the service account to become a temporary admin of the personal sites either as
         the service account or as a member of the Company Administrators group requires
         SharePoint Farm Administrator role or Site Collection Auditor at the web application
         housing MySites.

Doc_ID 715                                                                                             7

              Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

    l   The skipping inaccessible personal sites option will only scan sites where the service
        account has administrative access.

 Additional permission models are explained in the Appendices of the SharePoint Permissions
 document.

 Sensitive Data Discovery Auditing scans also require the 64-bit version of the Sensitive Data
 Discovery Add-on be installed on the server hosting the StealthAUDIT SharePoint Agent in order
 for Sensitive Data Discovery collections to successfully occur. This requirement is in addition to
 having the Sensitive Data Discovery Add-on be installed on the StealthAUDIT Console server. Each
 thread requires a minimum of 2 additional GB of RAM per host. For example, if the job is
 configured to scan 8 hosts at a time, then an extra 16 GB of RAM are required (8x2=16). See the
 StealthAUDIT Sensitive Data Discovery Add-On Installation Guide for additional information.

 Add-on Prerequisite: This Sensitive Data Discovery Add-on requires .NET Framework 3.5 to be
 installed.

 The credentials within the Connection Profile assigned to the SharePoint scans must have the
 required rights and firewall rules configured for running Access Auditing (SPAA) and/or Sensitive
 Data Discovery Auditing scans.

 Firewall Rules for Agent-Based Scans
 The following ports must be open for communication between StealthAUDIT and the SharePoint
 environment:

        Port        Protocol        Source         Direction         Target            Purpose

   1433            TCP          StealthAUDIT                     SharePoint        SharePoint SQL
                                Console                          SQL Server        Database
                                server                                             Connection

   445             TCP          StealthAUDIT                     SharePoint        Remote
                                Console                          Application       Registry
                                server                           Server            Connection
                                                                                   (Only required
                                                                                   for Web
                                                                                   Application
                                                                                   scoping)

Doc_ID 715                                                                                           8

               Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

         Port         Protocol        Source        Direction          Target         Purpose

     389/636         TCP          StealthAUDIT                    LDAP server      Agent
                                  SharePoint                                       Authentication
                                  Agent server

     9876*           TCP          StealthAUDIT                    StealthAUDIT     StealthAUDIT
                                  Console                         SharePoint       SharePoint
                                  server                          Agent server     Agent
                                                                                   Communication
                                                                                   Channel

 *Configurable value in the SharePoint Access Auditor Data Collector Wizard.

 SharePoint Data Collection Configuration for
 Agent-Based Scans
 To employ the agent-based type of scan for collecting SharePoint data, navigate to the desired
 SharePoint > 0.Collection > …_SystemScans job(s) and open the SharePoint Access Auditor Data
 Collector Wizard from the job’s query. The following configuration settings are required to
 employ agent-based scans:

 l   Agent Settings wizard page
     l   Check the Enable Agent Service Scans options must be selected to run agent-based scans
     l   Select the radio button for the desired Agent Service Identity:
         l   Use Job Credentials when job has same credentials as agent services
         l   Use default Service Principal Name when agent services use local machine credentials
         l   Use Custom Identity for other agent service credential scenarios
             l   Specify identity in the format spn:name or upn:name
             l   The token %HOST% may be substituted for the host name

 Other configuration settings which directly relate to permission options:

Doc_ID 715                                                                                          9

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 l   SharePoint data collection settings wizard page
     l   Collect Personal Sites > Skip inaccessible personal sites option requires the service account
         to be provisioned prior to the scan to scan personal sites
     l   Collect Personal Sites > Force scan account as admin of inaccessible personal sites option
         requires the service account to be a SharePoint Global Administrator (online) or Farm
         Admin (on-premise)
     l   Collect Personal Sites > Force Company Administrator as admin of inaccessible personal
         sites option requires the service account to be a SharePoint Global Administrator (online) or
         Farm Admin (on-premise)

 See the SPAA Query Configuration section of the StealthAUDIT User Guides v11.5 for additional
 information.

 NOTE: Sensitive Data Discovery Auditing scans are configured on the DLP Audit Settings and
 Select DLP Criteria wizard pages of the SharePoint Access Auditor Data Collector Wizard from the
 1-SPSEEK_SystemScans Job.

 SharePoint Agent-Less Scans
 The SharePoint agent-less scan architecture is capable of auditing permissions and content, or
 Access Auditing (SPAA) and Sensitive Data Discovery Auditing, on SharePoint on-premise and
 SharePoint Online. It is also capable of Activity Auditing (SPAC) on SharePoint on-premise.

 The SharePoint agent-less scan architecture requires permissions to be configured on the
 specified server:

 l   SharePoint 2013 through SharePoint 2019
     l   SharePoint Application Server permissions:
         l   Local group membership to Backup Operators
         l   Local group membership to WSS_WPG
     l   SharePoint Farm permissions:
         l   Membership in the Farm Read group at the farm level
             l   If the group does not exist already, then you will need to create a new group at that
                 level and grant it ‘Read’ access. Specifically, it is a group that exists within Central
                 Administration at the farm administrator level. This group only requires ‘Read’ access

Doc_ID 715                                                                                              10

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

               and is not giving farm admin access. Once the group is created, add the service
               account that StealthAUDIT will be leveraging to scan SharePoint.
    l   Web Application permissions:
        l    Custom Role with Site Collection Auditor at the web application level with the Open
             Items permission
    l   SharePoint Database Server permissions:
        l    For SharePoint 2013 through SharePoint 2019 – SPDataAccess on the on the SharePoint
             Content database and all Configuration databases
        NOTE: This permission should be applied on the desired Configuration database and all
        Content databases for the SharePoint version.
    l   MySites permissions are based on the SharePointAccess Data Collection configuration
        option:
        l    Forcing the service account to become a temporary admin of the personal sites either as
             the service account or as a member of the Company Administrators group requires
             SharePoint Farm Administrator role or Site Collection Auditor at the web application
             housing MySites.
        l    The skipping inaccessible personal sites option will only scan sites where the service
             account has administrative access.

 Sensitive Data Discovery Auditing scans also require the Sensitive Data Discovery Add-on be
 installed on the StealthAUDIT Console server. Each thread requires a minimum of 2 additional GB
 of RAM per host. For example, if the job is configured to scan 8 hosts at a time, then an extra 16
 GB of RAM are required (8x2=16). See the StealthAUDIT Sensitive Data Discovery Add-On
 Installation Guide for additional information.

 The credentials within the Connection Profile assigned to the SharePoint scans must have the
 required rights and firewall rules configured for running Access Auditing (SPAA) and/or Sensitive
 Data Discovery Auditing scans.

 Firewall Rules for Agent-Less Scans
 The following ports must be open for communication between StealthAUDIT and the SharePoint
 on-premise environment:

        Port         Protocol          Source         Direction         Target           Purpose

   1433             TCP            StealthAUDIT                     SharePoint       SharePoint SQL

Doc_ID 715                                                                                            11

               Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

          Port        Protocol        Source         Direction         Target           Purpose

                                  Console                          SQL Server       Database
                                  server                                            Connection

     445              TCP         StealthAUDIT                     SharePoint       Remote Registry
                                  Console                          Application      Connection
                                  server                           Server

     389/636          TCP         StealthAUDIT                     LDAP server      Authentication
                                  Console
                                  server

     80               TCP         StealthAUDIT                     SharePoint       StealthAUDIT
                                  Console                          Application      Communication
                                  server                           Server           Channel

 If the StealthAUDIT Console server is separated from the SharePoint environment by firewalls,
 then it is also necessary to add firewall rules to accommodate the custom web application ports
 that are used. Otherwise the StealthAUDIT Console is not able to connect to the SharePoint
 environment.

 SharePoint Data Collection Configuration for
 Agent-Less Scans
 To employ the agent-less type of scan for collecting SharePoint data, navigate to the desired
 SharePoint > 0.Collection > …_SystemScans job(s) and open the SharePoint Access Auditor Data
 Collector Wizard from the job’s query. The following configuration settings are required to
 employ agent-less scans:

 l   Agent Settings wizard page – Enable Agent Service Scans option must remain unselected

 Other configuration settings which directly relate to permission options:

 l   SharePoint data collection settings page
     l    Collect Personal Sites > Skip inaccessible personal sites option requires the service account
          to be provisioned prior to the scan to scan OneDrives / personal sites

Doc_ID 715                                                                                            12

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

    l   Collect Personal Sites > Force scan account as admin of inaccessible personal sites option
        requires the service account to be a SharePoint Global Administrator (online) or Farm
        Admin (on-premise)
    l   Collect Personal Sites > Force Company Administrator as admin of inaccessible personal
        sites option requires the service account to be a SharePoint Global Administrator (online) or
        Farm Admin (on-premise)

 See the SPAA Query Configuration section of the StealthAUDIT User Guides v11.5 for additional
 information.

 NOTE: Sensitive Data Discovery Auditing scans are configured on the DLP Audit Settings and
 Select DLP Criteria wizard pages of the SharePoint Access Auditor Data Collector Wizard from the
 1-SPSEEK_SystemScans Job.

Doc_ID 715                                                                                         13

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

                 Activity Monitor Configuration
 The Activity Monitor collects activity events from SharePoint on-premise. There must be a
 deployed activity agent on the SharePoint Application server which hosts the “Central
 Administration” component for the target environment.

 While actively monitoring, the agent generates activity log files which are stored on the agent
 server. The Activity Monitor integrates with other Stealthbits products as well as SIEM products:

 l   StealthAUDIT
     l   Activity Monitor activity agent writes activity log files on the agent server.
     l   StealthAUDIT data collection can be configured to collect data for a specified number of
         days.
         RECOMMENDED: The Activity Monitor should be configured to keep more activity log files
         than StealthAUDIT is collecting.
         l   StealthAUDIT Activity Auditing (SPAC) scans target the Application server to collect data
             from the activity log files specified as being for StealthAUDIT.
         l   StealthAUDIT Activity Auditing (SPAC) scans should be scheduled with these settings
             considered.
 l   Stealthbits Activity Monitor only
     l   Activity Monitor agent writes activity log files on the agent server.
     l   Activity Monitor Console search feature displays data from the activity log files.
 l   SIEM Integration
     l   Activity Monitor activity agent writes activity log files on the activity agent server.
     l   Activity Monitor sends the event stream to the SIEM product, which is configured on the
         Monitored Hosts’ properties > Syslog tab.

 Activity Monitor Activity Agent Deployment
 Servers targeted for activity agent deployment must have .NET Framework 4.7.2 or higher
 installed or the deployment fails. Deploy an activity agent from the Activity Monitor Console. The
 credential supplied during deployment must have:

 l   Group membership in the local Administrators group

 Follow the steps to deploy an activity agent.

 Step 1 – On the Agents tab, click Add agent to open the Add New Agent(s) window.

Doc_ID 715                                                                                               14

              Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 Step 2 – On the Install new agent page, enter the Server name to deploy to a single server.

 Step 3 – On the Credentials to connect to the server(s) page, provide the provisioned credential.

 Remember, Remote Registry Service must be enabled on the host where the activity agent is
 deployed.

 See the Stealthbits Activity Monitor Installation & Console User Guide for additional information
 on deploying and configuring the activity agent.

 Prepare for Activity Monitoring
 The target environment must be prepared for activity monitoring before the activity agent is
 configured. This preparation includes:

 l   For SharePoint on-premise, configure site collection audit settings
 l   Configure Firewall

 Once this preparation is complete, the activity agent can be configured for monitoring through
 the Activity Monitor Console. See the SharePoint On-Premise Configuration for Activity
 Monitoring section for details on completing this preparation.

 Monitored Host Configuration
 After activity agent deployment and the preparations for monitoring have been completed, add
 the Monitored Host to the activity agent server. In the Activity Monitor Console, open the Add
 New Host window and provide the following information:

 l   On the Choose Agent page, select the server for the Agent.
 l   On the Add Host page:
     l   Select the appropriate Storage device type.
     l   The SharePoint Application server name/IP Address will appear in the Server name or
         address textbox, but will not be editable.
     l   Optionally add a Comment to indicate intended output.
 l   On the SharePoint Options page, choose between auditing all sites (leave top textbox blank) or
     auditing specific sites (enter URLs in the textbox at the top). Then enter the User name and
     User password for the credentials to access SharePoint Central Administration audit logs for
     the site collections/web applications being monitored.

Doc_ID 715                                                                                           15

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 l   On the Configure Operations page, the following configurations can be modified:
     l   SharePoint Operations – Check operations on SharePoint activity to be monitored
     l   Permission Operations – Check operations on permission activity to be monitored
 l   On the Configure Basic Options page, the following configurations are modified:
     l   Period to keep Log files - Activity logs are deleted after the number of days entered. Default
         is set to 10 days.
         RECOMMENDED: Keep a minimum of 10 days of activity logs. Raw activity logs should be
         retained to meet an organization’s audit requirements.
 l   On the Where to Log the Activity page, select whether to send the activity to either a Log File
     or Syslog Server.
 l   Configure the options on either the Log File page, the Syslog Server page, or both, depending
     on what options were selected on the Where to Log the Activity page.
     l   For Log File, the configurable options are:
         l   Specify output file path – Specify the file path where log files are saved. Click the ellipses
             button (...) to open the Windows Explorer to navigate to a folder destination. Click Test
             to test if the path works.
         l   Period to keep Log files – Log files will be deleted after the period entered number of
             days entered. The default is 10 days. Use the dropdown to specify whether to keep the
             Log files for a set amount of Minutes, Hours, or Days.
         l   Log file format – Select whether the log file will be saved as a JSON or TSV file
         l   This log file is for StealthAUDIT – Enable this option to have StealthAUDIT collect this
             monitored host configuration
             RECOMMENDED: Identify the configuration to be read by StealthAUDIT when integration
             is available.
             l   While the Activity Monitor can have multiple configurations per host, StealthAUDIT
                 can only read one of them.
     l   For Syslog, the configurable options are:
         l   Syslog server in SERVER[:PORT] format – Type the Syslog server name with a
             SERVER:Port format in the textbox.
             l   The server name can be short name, fully qualified name (FQDN), or IP Address, as
                 long as the organization’s environment can resolve the name format used. The Event

Doc_ID 715                                                                                                16

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

                 stream is the activity being monitored according to this configuration for the
                 monitored host.
       l     Syslog Protocol – Identify the Syslog protocol to be used for the Event stream. The drop-
             down menu includes:
             l   UDP
             l   TCP
             l   TLS
             l   The TCP and TLS protocols add the Message framing drop-down menu. See the Syslog
                 Tab section for additional information.
       l     The Test button sends a test message to the Syslog server to check the connection. A
             green check mark or red will determine whether the test message has been sent or failed
             to send. Messages vary by Syslog protocol:
             l   UDP – Sends a test message and does not verify connection
             l   TCP/TLS – Sends test message and verifies connection
             l   TLS – Shows error if TLS handshake fails
             l   See the Syslog Tab section for additional information.

 After the monitored host configuration is complete, additional steps are required for
 StealthAUDIT, and SIEM integration. After the monitored host configuration is complete,
 additional steps are required for StealthAUDIT and SIEM integration. See the StealthAUDIT
 Integration and SIEM Integration sections for additional information.

 Firewall Rules for Activity Monitoring
 Firewall settings are dependent upon the type of environment being targeted. The following
 firewall settings are required for communication between activity agent server and the Activity
 Monitor Console:

           Communication Direction                Protocol        Ports             Description

   Activity Monitor to Activity Agent           TCP             4498         Activity Agent
   Server                                                                    Communication

Doc_ID 715                                                                                           17

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 The Windows firewall rules need to be configured on the Windows server, which require certain
 inbound rules be created if the scans are running in applet mode. These scans operate over a
 default port range, which cannot be specified via an inbound rule. For more information, see the
 Microsoft Connecting to WMI on a Remote Computer article.

 StealthAUDIT Integration
 StealthAUDIT reads the activity log files created by the activity agent which are designated as
 being “…for StealthAUDIT” in the monitored host configuration. The credential in the Connection
 Profile must have:

 l   Group membership in the local Administrators group on the activity agent server

 Remember, if the activity log files are being archived, then the credential used by StealthAUDIT
 to read the activity log files must also have READ and WRITE permissions on the archive location.

 StealthAUDIT Activity Auditing scans are collecting data stored in the activity log files by the
 activity agents. The following firewall settings are required for communication between the
 activity agent server and StealthAUDIT:

             Communication Direction              Protocol             Ports          Description

     StealthAUDIT to Activity Agent Server      TCP              445                SMB

     StealthAUDIT to Activity Agent Server      TCP              Predefined         WMI

 Identify an Activity Log for StealthAUDIT
 While the Activity Monitor can have multiple configurations per host, StealthAUDIT can only read
 one of them. Therefore, after the Activity Monitor has been configured to monitor a host, it is
 necessary to indicate when that configuration is for StealthAUDIT. Follow the steps to identify the
 activity log file to be read by StealthAUDIT.

 Step 1 – Within the Activity Monitor Console on the Monitored Hosts tab, select the desired
 configuration and click Edit.

 Step 2 – On the Log File tab:

Doc_ID 715                                                                                          18

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 l   For SharePoint on-premise, ensure the Log file format option is set to JSON.
 l   Days to keep Log files – Activity logs are deleted after the number of days entered. The default
     is 10.
     RECOMMENDED: Keep a minimum of 10 days of activity logs. Raw activity logs should be
     retained to meet an organization’s audit requirements.
     l   For StealthAUDIT integration, this value must be higher than the number of days between
         the StealthAUDIT Activity Auditing scans.
 l   Check the This log file is for StealthAUDIT box.
     RECOMMENDED: Select the Comments tab and identify this output as being configured for
     StealthAUDIT.

 Step 3 – Then click OK to save the setting.

 StealthAUDIT now reads that activity log file when scanning the associated host.

 StealthAUDIT Data Collection Configuration for
 SharePoint Activity Scans
 To employ Activity Auditing (SPAC) scans, navigate to the SharePoint > 0.Collection > 1-SPAC_
 SystemScans Job and open the SharePoint Access Auditor Data Collector Wizard from the job’s
 query. Configure the following settings:

 l   Activity Date Scope wizard page
     l   Scan Filters – These options indicate the number of days of activity details are collected and
         retained within StealthAUDIT.
         l   Remember, the schedule for which the 1-SPAC_SystemScans Job is set must be less than
             the number of days configured for activity log retention by the Activity Monitor activity
             agent.
     RECOMMENDED: Retain a minimum of 10 days of activity log files and schedule the job to
     execute as often as possible within the organization, usually daily.
 l   Activity Log Locations wizard page – Optionally configure log locations to avoid needing
     Remote Registry access in order to locate the activity log files.

 See the SPAA Query Configuration section of the StealthAUDIT User Guides v11.5 for additional
 information.

Doc_ID 715                                                                                           19

              Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 SIEM Integration
 The Activity Monitor can be configured to stream events to various SIEM products.

 NOTE: The Activity Monitor can be configured for multiple outputs for a host, e.g. for
 StealthAUDIT, StealthINTERCEPT, StealthDEFEND, or SIEM products. Add a new output for the
 same host to the Monitored Host tab in the Activity Monitor Console to customize the activity
 data to be sent to a SIEM product.

 RECOMMENDED: Add a Comment to identify the product for which the output aligns. Comments
 can be added when the new output is configured on the Add Hosts page or when the host
 properties are edited on the Comments tab.

 After the Activity Monitor has been configured to monitor a host, it is necessary to select a syslog
 template to be used for communicating with the SIEM product. The following Syslog templates
 have been provided:

 l   AlienVault
 l   HP Arcsight
 l   LogRythm
 l   McAfee
 l   QRadar
 l   Splunk
 l   CEF (generic CEF message format)
 l   LEEF (generic LEEF message format)
     NOTE: Stealthbits has created apps for IBM® QRadar® and Splunk® which are available through
     their app exchanges. See the Stealthbits File Activity Monitor App for QRadar User Guide or the
     Stealthbits File Activity Monitor App for Splunk User Guide for additional information.

 Follow these steps to configure the Activity Monitor to stream event data to a SIEM product.

 Step 1 – Within the Activity Monitor Console on the Monitored Hosts tab, select the desired
 configuration and click Edit. Select the Syslog tab.

 Step 2 – Type the server name for the SIEM product in a [SERVER]:[PORT] format in the textbox.

 Step 3 – Select the desired Syslog protocol from the drop-down menu.

 Step 4 – Click the ellipsis (…) to open the Syslog Message Template window.

 Step 5 – Select the desired template from the Template drop-down menu. If desired, the
 message can be modified, which creates a “Custom” template.

Doc_ID 715                                                                                         20

              Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 Step 6 – Click OK to save the selection and close the Syslog Message Template window.
 Remember, it is recommended to select the Comments tab and identify this output as being
 configured for the SIEM product, e.g. SIEM.

 Step 7 – Then click OK to save the changes and close the host’s properties window.

 The template is assigned as the Syslog message template for the selected monitored host. The
 SIEM product begins receiving event stream data.

Doc_ID 715                                                                                      21

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

     SharePoint On-Premise Configuration
             for Access Auditing
 In order for StealthAUDIT to execute Access Auditing (SPAA) and/or Sensitive Data Discovery
 Auditing scans, the credential must have the following permissions on the target host:

 l   SharePoint 2013 through SharePoint 2019
     l   Agent-based scans:
         l   Membership in the local Administrator group on the on server where the StealthAUDIT
             SharePoint Agent is installed
         l   SharePoint Application Server permissions:
             l   Local group membership to Backup Operators
             l   Local group membership to WSS_WPG
             l   Log on as a Service in the Local Security Policy
             l   Full Control on the agent install directory, example – C:\Program
                 Files\STEALTHbits\StealthAUDIT\SPAA
         l   SharePoint Farm permissions:
             l   Membership in the Farm Read group at the farm level
         l   Web Application permissions:
             l   Custom Role with Site Collection Auditor at the web application level with the Open
                 Items permission
         l   SharePoint Database Server – SPDataAccess permission on the desired Configuration
             database and all Content databases
         l   DB_Owner on StealthAUDIT database if using Windows Authentication for the Storage
             Profile
         l   MySites permissions are based on the SharePointAccess Data Collection configuration
             option:
             l   Forcing the service account to become a temporary admin of the personal sites either
                 as the service account or as a member of the Company Administrators group requires
                 SharePoint Farm Administrator role or Site Collection Auditor at the web application
                 housing MySites.

Doc_ID 715                                                                                             22

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

             l   The skipping inaccessible personal sites option will only scan sites where the service
                 account has administrative access.
        NOTE: Requires the StealthAUDIT SharePoint Agent to be installed on the Application server
        that hosts the “Central Administration” component.
    l   Agent-less scans:
        l    SharePoint Application Server permissions:
             l   Local group membership to Backup Operators
             l   Local group membership to WSS_WPG
        l    SharePoint Farm permissions:
             l   Membership in the Farm Read group at the farm level
        l    Web Application permissions:
             l   Custom Role with Site Collection Auditor at the web application level with the Open
                 Items permission
        l    SharePoint Database Server – SPDataAccess permission on the desired Configuration
             database and all Content databases:
        l    MySites permissions are based on the SharePointAccess Data Collection configuration
             option:
             l   Forcing the service account to become a temporary admin of the personal sites either
                 as the service account or as a member of the Company Administrators group requires
                 SharePoint Farm Administrator role or Site Collection Auditor at the web application
                 housing MySites.
             l   The skipping inaccessible personal sites option will only scan sites where the service
                 account has administrative access.

 Configure SharePoint Farm Permissions
 Follow the steps to configure the SharePoint Farm level permissions on SharePoint 2010 through
 SharePoint 2019 farms.

 Step 1 – In the SharePoint Central Administration Center, navigate to the Security section.

 Step 2 – Select the Manage the farm administrators group option under Users.

 Step 3 – If the Farm Read group exists, add the service account to that group. If the Farm Read
 group has been deleted, it is necessary to create a new group with Read privileges at the Farm
 level:

Doc_ID 715                                                                                                23

                 Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 l   Select More under the Groups section.
 l   Select New Group from the New drop-down menu.
 l   Ensure the group has the Read – Can view pages and list items and download documents
     permission.
 l   Add the service account to this new group.

 The service account has Read level access at the Farm level.

 Configure SharePoint Web Application
 Permissions
 Follow the steps to configure the SharePoint web application level permissions on SharePoint
 2010 through SharePoint 2019 farms.

 Step 1 – In the SharePoint Central Administration Center, navigate to the Application
 Management section.

 Step 2 – Select Manage web applications option under Web Applications.

 Step 3 – Create a new policy for the desired web application. Follow these steps:

 l   Click Permission Policy. The Manage Permission Policy Levels window opens.
 l   Click Add Permission Policy Level. Select the following:
     l   Check the Site Collection Auditor permission.
     l   Check the Open Items box in the Site Permissions Grant column.
     l   Click Save.

 Step 4 – Repeat Step 3 for each web application in scope. It is recommended to give these
 policies the same name.

 Step 5 – Add the service account to the newly created roles. Follow these steps:

 l   Select a web application with the newly created role.
 l   Click User Policy. The Policy for Web Application window opens.
 l   Click Add Users. Leave all zones select and click Next.
 l   Add the service account in the Users textbox. Check the newly created role with site collection
     auditor in the Permissions section. Click Finish.

 Step 6 – Repeat Step 5 for each web application in scope.

Doc_ID 715                                                                                        24

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 The service account is provisioned as a Site Collection Auditor on all web applications to be
 audited.

 Configure SharePoint Database Server
 Permissions
 Follow the steps to configure the SharePoint database server permissions on SharePoint 2010
 through SharePoint 2019 farms.

 Step 1 – Navigate to the SharePoint database server user configuration via SQL Management
 Studio.

 Step 2 – Provision the service account to have:

 l   On SharePoint 2013 through SharePoint 2019 – SPDataAccess Database role membership
 l   This database role membership needs to be configured on:
     l   SharePoint Configuration database (ShaerPoint_Config)
     l   All SharePoint Content databases housing web application data (by default the content
         databases begin with WSS_Content_, but they can be customized)

 The service account is provisioned with SharePoint database permissions.

 Install the StealthAUDIT SharePoint Agent
 Follow the steps to install the SharePoint Agent on the Application server that hosts the “Central
 Administration” component of the targeted SharePoint farm(s).

 Step 1 – Run the StealthAUDITSPAA.exe executable and the StealthAUDIT SharePoint Agent
 Setup Wizard will open.

 Step 2 – Navigate to the End-User License Agreement page, check the I accept the terms in the
 License Agreement box and click Next.

 Step 3 – Optional change the installation directory on the Destination Folder page. Click Next to
 install to the default folder or click Change to select a different location.

 Step 4 – On the Configure Service Security page, enter the User Name and Password for the
 SharePoint Service Account.

 Step 5 – Navigate to the StealthAUDIT SharePoint Agent page, click Install to start installation.
 Then click Finish to close the wizard.

Doc_ID 715                                                                                           25

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 The StealthAUDIT SharePoint Agent is installed. Remember, Sensitive Data Discovery Auditing
 scans also require the 64-bit version of the Sensitive Data Discovery Add-on be installed on the
 server hosting the StealthAUDIT SharePoint Agent in order for Sensitive Data Discovery
 collections to successfully occur.

Doc_ID 715                                                                                          26

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

   SharePoint On-Premise Configuration
         for Activity Monitoring
 SharePoint Event Auditing must be enabled for each site collection to be monitored by the
 Activity Monitor and/or audited by StealthAUDIT. The following sections provide instructions for
 the specific version of SharePoint.

 For StealthAUDIT Activity Auditing (SPAC) scans, the audit logs generated by SharePoint must be
 retained for more days than the number of days between the StealthAUDIT scans.

 RECOMMENDED: For the Activity Monitor, select all events to be monitored in both the
 Documents and Items section and the List, Libraries, and Site section.

 Once SharePoint Event Auditing has been enabled, StealthAUDIT can collect the logs for Activity
 Auditing (SPAC) scans and/or the SharePoint farm can be added to the Monitored Hosts tab of
 the Activity Monitor Console. See the Monitored Host Configuration section for additional
 information.

 Enable Event Auditing on SharePoint 2013
 through SharePoint 2019
 Follow the steps for each site collection within a SharePoint 2013 through SharePoint 2019 farm.

 Step 1 – Select Settings > Site settings.

 Step 2 – Under Site Collection Administration, click Go to top level site settings.

 Step 3 – On the Site Settings page, under Site Collection Administration, select Site collection
 audit settings.

 Step 4 – On the Configure Audit Settings page, in the Documents and Items section select the
 events to be audited.

 Step 5 – Still on the Configure Audit Settings page, in the List, Libraries, and Site section select
 the events to be audited.

 Step 6 – Click OK to save the changes.

 SharePoint will create the audit logs to be monitored by the Activity Monitor and/or audited by
 StealthAUDIT. See the Microsoft Configure audit settings for a site collection (SharePoint
 2013/2016/2019) article for additional information.

Doc_ID 715                                                                                              27

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

        StealthAUDIT Connection Profile &
                   Host List
 Once the target environment has been configured for auditing, it is necessary to create a custom
 Connection Profile and a custom Host List within StealthAUDIT.

 SharePoint On-Premises Custom
 Connection Profile
 Within in StealthAUDIT, create a Connection Profile for the target hosts with the credentials
 configured. It should align to the target host list to be created next. For Access Auditing (SPAA)
 and/or Sensitive Data Discovery Auditing scans, the Connection Profile needs to contain the
 account provisioned for Access Auditing (SPAA). For Activity Auditing (SPAC) scans, the
 Connection Profile needs to contain the credential with access to read the activity log files that
 the Activity Monitor activity agent creates.

 For a domain account, set the following information on the User Credentials window:

 l   Select Account Type – Active Directory Account
 l   Domain – Select from the drop-down menu or type in the textbox
 l   User name – Type the user name
 l   Password Storage – Application (unless the credential is stored within the CyberArk Enterprise
     Password Vault)
 l   Password – [For the provided user account]
 l   Confirm – Re-type the password

 See the Connection section of the StealthAUDIT User Guides v11.5 for instructions on creating a
 Connection Profile.

 Apply the Connection Profile to the host inventory query and to the SharePoint > 0.Collection Job
 Group.

 SharePoint Custom Host List
 Create a custom host list containing the target hosts for which the Connection Profile just created
 contains credentials. For SharePoint on-premise, the target host needs to be the SharePoint
 Application server that hosts the “Central Administration” component.

Doc_ID 715                                                                                            28

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

 If the target hosts are located within a specific OU within the domain, then the StealthAUDIT Host
 Discovery Wizard can be used. Scope the discovery query task by selecting the Query an Active
 Directory server (General) option on the Source page, and then by navigating to the OU on the
 Active Directory page. See the Query an Active Directory Server (General) Source Option section
 of the StealthAUDIT User Guides v11.5 for additional information.

 A custom host list can be manually created by entering the host names, or it can be imported
 from either a CSV file or a database table. See the Add Hosts section of the StealthAUDIT User
 Guides v11.5 for additional information.

 Assign the custom host list to the SharePoint > 0.Collection Job Group.

Doc_ID 715                                                                                        29

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
StealthAUDIT®
Stealthbits Activity Monitor®

                                More Information
 Identify threats. Secure data. Reduce risk.

 Stealthbits, now part of Netwrix is a data security software company focused on protecting an
 organization’s credentials and data. By removing inappropriate data access, enforcing security
 policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements,
 and decrease operations expense.

 For information on our products and solution lines, check out our website at
 www.stealthbits.com or send an email to our information center at info@stealthbits.com.

 If you would like to speak with a Stealthbits Sales Representative, please contact us at
 +1.201.447.9300 or via email at sales@stealthbits.com.

 Have questions? Check out our online Documentation or our Training Videos (requires login):
 https://www.stealthbits.com/documentation. To speak to a Stealthbits Representative: please
 contact Stealthbits Support at +1.201.447.9359 or via email at support@stealthbits.com.

 Need formal training on how to use a product more effectively in your organization? Stealthbits is
 proud to offer FREE online training to all customers and prospects! For schedule information,
 visit: https://www.stealthbits.com/on-demand-training.

Doc_ID 715                                                                                           30

             Copyright 2021 STEALTHBITS, NOW PART OF NETWRIX, ALL RIGHTS RESERVED
You can also read