SlideShare uma empresa Scribd logo
1 de 5
SAMBA WITH AUDIT
TRAIL
ADDITIONAL CONFIGURATION FOR SAMBA (UBUNTU SERVER)

Ali Rachman
SAMBA
Samba is free software that use SMB/CIFS networking protocol. Samba originally developed by Andrew
Tridgell. In this presentation, I will show you a short configuration for configuring samba with audit trail, so
we can know user activity within our file server.
Audit trail is security-relevant chronological record, set of records, and/or destination and source of record
that provide documentary evidence of the sequence of activities that have affected at any time a specific
operation, procedure, or event. Audit records typically result from activities such as financial transaction,
scientific research and health care data transaction, or communications by individual people, systems,
accounts, or other entities (Wikipedia)

Ali Rachman
SAMBA CONFIGURATION FOR AUDIT TRAIL
Example Configuration
[global]
workgroup = Workgroup
server string = Samba Server
Version %v
netbios name = server-sharing
security = share
[SHARE]
path = /data
public = yes
browseable = yes
read only = no
force user = test
force group = test
vfs objects = full_audit
full_audit:prefix = %u|%i|%m|%s
full_audit:success = mkdir rename unlink rmdir pwrite
full_audit:failure = none
full_audit:facility = LOCAL6
Ali Rachman
full_audit:priority = NOTICE
Edit file /etc/rsyslog.d/50-default.conf and following command
# Default rules for rsyslog.
#
#
For more information see rsyslog.conf(5) and /etc/rsyslog.conf
#
# First some standard log files. Log by facility.
#
auth,authpriv.*
/var/log/auth.log
*.*;auth,authpriv.none
-/var/log/syslog
#cron.*
/var/log/cron.log
daemon.*
-/var/log/daemon.log
kern.*
-/var/log/kern.log
lpr.*
-/var/log/lpr.log
mail.*
-/var/log/mail.log
user.*
-/var/log/user.log
local6.*
-/var/log/samba/audit.log
Ali Rachman
After that do following command
#service rsyslog restart
#service smbd restart
You can see the log at /var/log/samba
#tail audit.log

THANK
YOU
Ali Rachman

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Security Design Considerations In Robotic Process Automation.docx
Security Design Considerations In Robotic Process Automation.docxSecurity Design Considerations In Robotic Process Automation.docx
Security Design Considerations In Robotic Process Automation.docx
 
Introduction to Data Warehouse
Introduction to Data WarehouseIntroduction to Data Warehouse
Introduction to Data Warehouse
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
 
Data Governance_Notes.pptx
Data Governance_Notes.pptxData Governance_Notes.pptx
Data Governance_Notes.pptx
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Single Sign On using ADFS.pptx
Single Sign On using ADFS.pptxSingle Sign On using ADFS.pptx
Single Sign On using ADFS.pptx
 
Network security
 Network security Network security
Network security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Introduction to ITIL 4 and IT service management
Introduction to ITIL 4 and IT service managementIntroduction to ITIL 4 and IT service management
Introduction to ITIL 4 and IT service management
 
SaaS Presentation
SaaS PresentationSaaS Presentation
SaaS Presentation
 
Data Migration Steps PowerPoint Presentation Slides
Data Migration Steps PowerPoint Presentation Slides Data Migration Steps PowerPoint Presentation Slides
Data Migration Steps PowerPoint Presentation Slides
 
Cloud computing using Eucalyptus
Cloud computing using EucalyptusCloud computing using Eucalyptus
Cloud computing using Eucalyptus
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Intelligent Weather Service
Intelligent Weather Service Intelligent Weather Service
Intelligent Weather Service
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 

Semelhante a Short samba tutorial with audit trail function

Service Lifecycle Management with Fuse Service Works
Service Lifecycle Management with Fuse Service WorksService Lifecycle Management with Fuse Service Works
Service Lifecycle Management with Fuse Service Works
Kenneth Peeples
 
Blbs tn-bloombase-store safe-das-san-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-das-san-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-das-san-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-das-san-benchmarking-uslet-en-r3
Bloombase
 
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docxWeek1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
philipnelson29183
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Bloombase
 
WS-VLAM workflow
WS-VLAM workflowWS-VLAM workflow
WS-VLAM workflow
guest6295d0
 

Semelhante a Short samba tutorial with audit trail function (20)

1.7 system calls
1.7 system calls1.7 system calls
1.7 system calls
 
Tableau Security Model.pptx
Tableau Security Model.pptxTableau Security Model.pptx
Tableau Security Model.pptx
 
SaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
SaltConf14 - Ben Cane - Using SaltStack in High Availability EnvironmentsSaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
SaltConf14 - Ben Cane - Using SaltStack in High Availability Environments
 
Service Lifecycle Management with Fuse Service Works
Service Lifecycle Management with Fuse Service WorksService Lifecycle Management with Fuse Service Works
Service Lifecycle Management with Fuse Service Works
 
Blbs tn-bloombase-store safe-das-san-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-das-san-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-das-san-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-das-san-benchmarking-uslet-en-r3
 
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docxWeek1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
 
Building Automated Governance Using Code, Platform Services & Several Small P...
Building Automated Governance Using Code, Platform Services & Several Small P...Building Automated Governance Using Code, Platform Services & Several Small P...
Building Automated Governance Using Code, Platform Services & Several Small P...
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
aplikom
aplikomaplikom
aplikom
 
Sap abap training !! sap abap online training !! sap abap video training !! ...
Sap abap training !! sap abap online training !! sap  abap video training !! ...Sap abap training !! sap abap online training !! sap  abap video training !! ...
Sap abap training !! sap abap online training !! sap abap video training !! ...
 
Sap basis administrator user guide
Sap basis administrator   user guideSap basis administrator   user guide
Sap basis administrator user guide
 
Kali linux useful tools
Kali linux useful toolsKali linux useful tools
Kali linux useful tools
 
Spirent Temeva - SaaS for Cloud and Network Testing
Spirent Temeva - SaaS for Cloud and Network TestingSpirent Temeva - SaaS for Cloud and Network Testing
Spirent Temeva - SaaS for Cloud and Network Testing
 
Introduction to Microsoft Azure 101
Introduction to Microsoft Azure 101Introduction to Microsoft Azure 101
Introduction to Microsoft Azure 101
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
 
Security
SecuritySecurity
Security
 
Relational Won't Cut It: Architecting Content Centric Apps
Relational Won't Cut It: Architecting Content Centric AppsRelational Won't Cut It: Architecting Content Centric Apps
Relational Won't Cut It: Architecting Content Centric Apps
 
WS-VLAM workflow
WS-VLAM workflowWS-VLAM workflow
WS-VLAM workflow
 
AWS Lambda Security Inside & Out
AWS Lambda Security Inside & OutAWS Lambda Security Inside & Out
AWS Lambda Security Inside & Out
 

Último (6)

2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing Yoga2023 - Between Philosophy and Practice: Introducing Yoga
2023 - Between Philosophy and Practice: Introducing Yoga
 
February 2024 Recommendations for newsletter
February 2024 Recommendations for newsletterFebruary 2024 Recommendations for newsletter
February 2024 Recommendations for newsletter
 
March 2023 Recommendations for newsletter
March 2023 Recommendations for newsletterMarch 2023 Recommendations for newsletter
March 2023 Recommendations for newsletter
 
HONOURABLE LAWRENCE BANDASOA TABASE funeral brochure
HONOURABLE LAWRENCE BANDASOA TABASE funeral brochureHONOURABLE LAWRENCE BANDASOA TABASE funeral brochure
HONOURABLE LAWRENCE BANDASOA TABASE funeral brochure
 
Social Learning Theory presentation.pptx
Social Learning Theory presentation.pptxSocial Learning Theory presentation.pptx
Social Learning Theory presentation.pptx
 
HONOURABLE LAWRENCE BANDASOA TABASE funeral brochure
HONOURABLE LAWRENCE BANDASOA TABASE funeral brochureHONOURABLE LAWRENCE BANDASOA TABASE funeral brochure
HONOURABLE LAWRENCE BANDASOA TABASE funeral brochure
 

Short samba tutorial with audit trail function

  • 1. SAMBA WITH AUDIT TRAIL ADDITIONAL CONFIGURATION FOR SAMBA (UBUNTU SERVER) Ali Rachman
  • 2. SAMBA Samba is free software that use SMB/CIFS networking protocol. Samba originally developed by Andrew Tridgell. In this presentation, I will show you a short configuration for configuring samba with audit trail, so we can know user activity within our file server. Audit trail is security-relevant chronological record, set of records, and/or destination and source of record that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event. Audit records typically result from activities such as financial transaction, scientific research and health care data transaction, or communications by individual people, systems, accounts, or other entities (Wikipedia) Ali Rachman
  • 3. SAMBA CONFIGURATION FOR AUDIT TRAIL Example Configuration [global] workgroup = Workgroup server string = Samba Server Version %v netbios name = server-sharing security = share [SHARE] path = /data public = yes browseable = yes read only = no force user = test force group = test vfs objects = full_audit full_audit:prefix = %u|%i|%m|%s full_audit:success = mkdir rename unlink rmdir pwrite full_audit:failure = none full_audit:facility = LOCAL6 Ali Rachman full_audit:priority = NOTICE
  • 4. Edit file /etc/rsyslog.d/50-default.conf and following command # Default rules for rsyslog. # # For more information see rsyslog.conf(5) and /etc/rsyslog.conf # # First some standard log files. Log by facility. # auth,authpriv.* /var/log/auth.log *.*;auth,authpriv.none -/var/log/syslog #cron.* /var/log/cron.log daemon.* -/var/log/daemon.log kern.* -/var/log/kern.log lpr.* -/var/log/lpr.log mail.* -/var/log/mail.log user.* -/var/log/user.log local6.* -/var/log/samba/audit.log Ali Rachman
  • 5. After that do following command #service rsyslog restart #service smbd restart You can see the log at /var/log/samba #tail audit.log THANK YOU Ali Rachman