Top
Systemwalker Desktop Patrol Operation Guide: for Administrators
FUJITSU Software

13.5.1 Preparation

It describes how to set the auditing indicator to be used in security auditing.

In addition, it is not required to set auditing indicator when the recommended auditing indicator provided by Systemwalker Desktop Patrol is not to be modified.


The procedure is as follow.

  1. Log on to the AC menu.

  2. Click Setup of Report.

    The following window will be displayed.

  3. Click the Security Auditing button, and the Security Audit Set window will be displayed.

  4. Select the Audit Pointer to be modified, and click the Set button of Audit Pointer.

    To newly define the auditing indicator, select For User Definition. To edit the recommended indicator, select Information Disclosure or Vulnerability Countermeasure.

    In addition, the setting of each auditing item is selected by combination of operation method and environment.

    The Audit Pointer Setting window will be displayed.

    Set the following information, and click the OK button.

    Item

    Description

    Audit Pointer Name

    Set the name of auditing indicator.

    Up to 16 fullwidth characters or 32 halfwidth alphanumeric characters and symbols can be set.

    Not as Output Object of Security Auditing Report

    Select when not to output security auditing report.

    As Output Object of Security Auditing Report

    Select to output security auditing report.

    Level of Section as Aggregation (Note 1)

    Not specify or select from level 1 to level 9.

    Audit Item

    HW

    Select it when BIOS status is included in the output item of security auditing report.

    OS (System)

    Select it when status of OS settings related to the system such as logon status and settings of automatic update are included in the output item of security auditing report.

    OS (User)

    Select it when status of OS settings related to use such as screen saver is included in the output item of security auditing report.

    Internet Explorer

    Select it when the setting status of security zone status of Internet Explorer is included in the output item of security auditing report.

    Windows Update Program (Note 2)

    Select it when the setting status of patch installation such as OS is included in the output item of security auditing report.

    Anti-Virus Software

    Select it when the setting status of installation status of anti-virus software and real-time search .etc is included in the output item of security auditing report.

    Status of Anti-Virus Software Virus Pattern

    Select it when the application status of virus patter is included in the output item of security auditing report.

    Access Control

    Select it when the application status of prohibition operation is included in the output item of security auditing report.

    Introduction of Audit Software

    Select it when the setting status of auditing software installation status is included in the output item of security auditing report.

    Application

    Select it when the setting status of application such as Google Desktop function and firewall settings are included in the output item of security auditing report.

    Detail

    Display the window to set whether to output the auditing for each item.

    For setting items, refer to "Items of Auditing Indicator".

    Note 1) It is the section level when aggregating sections with high achievement rates and sections with low achievement rates.

    In the following example, when the second level is specified as the section level, the unit displayed as section is as follows.

    • Upper-level section

    • General section (including subordinate sections)

    In the "General Section" of the second level, the PC under the "Business Division", "Finance Division", "Administrative Affairs Division" and "General Affairs Division" will be aggregated and sections with high achievement rates and sections with low achievement rates will be judged in the aggregation content.

    In addition, for the "Software Unit", "Hardware Unit" and "Management Unit" in the higher level than the second level, it will be aggregated as one section of "Upper-level Section", and sections with high achievement rates and sections with low achievement rates will be judged in the "Upper-level Section".

    In addition, if no level has been set, all sections will be targets of sections with high achievement rates and sections with low achievement rates. In addition, for PC without configuration, no judgment of sections with high achievement rates and sections with low achievement rates will be included.

    Note 2) Select the patch installation status using the patch distribution information managed by Systemwalker Desktop Patrol. In addition, for the patch to be selected, it is required to select automatic patch installation Distribution > Security Patches Distribution window in the main menu. For the patch without selection of automatic patch installation, it will not be selected.

    If automatic patch installation is not executed, set Not as Auditing Target in the Details window.

    If all patches included in the patch distribution information are installed to PC, this PC will be processed as the PC whose patch installation is OK. Even if one patch is not installed, it will be processed as the PC of ERR. The patch is not installed can be confirmed from the window of Systemwalker Desktop Patrol.

    For information on how to confirm the patch not installed, refer to "3.2.1 View Inventory Information".

    To modify the output standard of each auditing item, select each auditing item and click the Details button. The following is the window when Hardware is selected.

    Set the following information, and click the OK button.

    Item

    Description

    BIOS Startup Password

    For the startup password of BIOS, select when setting the output to report.

    BIOS Setup Password

    For the setting password of BIOS, select when setting the output to report.

    BIOS Hard Disk Password

    For the hard disk password of BIOS, select when setting the output to report.

    Settings (Note)

    No Output Target

    Select when the selected items are not taken as output target.

    Output Target

    Select when the selected items are taken as output target.

    Items Judged as OK

    For Unable to Collect, Not Set and Has been Set, l select the items that are judged as OK.

    Note) Setting of judgment standard can be set for each auditing item of Access Control Status.

    Set the auditing items apart from Hardware in the same way.

    In addition, Item Name displayed in the setting window may vary depending on the item of auditing indicator. For other auditing items, refer to "Items of Auditing Indicator".

  5. To modify the threshold value of auditing result, click the Modify button of Threshold for audit results.

    In the Threshold setting of audit results window, the output standard of icon can be modified.

    Set the following information, and click the OK button.

    Item

    Description

    Threshold value of Sunny icon

    Only single-byte number can be set.

    The initial value is over 90%.

    Threshold value of Overcast icon

    Only single-byte number can be set.

    The initial value is over 70%.

    Set a value that is smaller than the threshold value of Sunny.

    Threshold value of Rainy icon

    Only single-byte number can be set.

    The initial value is over 50%.

    Set a value that is smaller than the threshold value of Overcast

    Save the icon to the following folder and the icon can be modified.

    Registration folder of image file

    AC installation directory\images

    Image file/file name

    Image File

    File Name

    best.bmp

    better.bmp

    bad.bmp

    worse.bmp

    Size/Format of image file

    Size/Format

    Width

    82 pixels (Note)

    Height

    36 pixels (Note)

    Format

    bmp format

    Note) when the image file of a different size is used, displayed as the above size.

    Point

    Modification of image file

    • The modification of image file is only effective in the modified AC terminal. To unify image files in all AC terminals, replace the image file of all AC terminals.

    • There are following methods to restore image file.

      • Before modification, when avoiding the icon of product, configure the avoided product icon to the registration folder again.

      • Before modification, when the icon of product is not avoided, delete the icon after modification and re-install the AC of this product. (it is not need to uninstall since it is overwriting installation)

    • When the image file is displayed as blank, reasons such as files being damaged or insufficient should be considered. When it is displayed as blank, check the saving target of icon and restore through preparing a new image or restoring the above image file.

Items of Auditing Indicator

It describes the items of monitoring indicator.

For content of each item, refer to "3.2.6 View Security Information".

For the following items, whether the auditing report will be output as output target of auditing report can be set in each item unit.


HW (Note)

Information

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

BIOS Startup Password

Not as output object

As output object

BIOS Setup Password

Not as output object

As output object

BIOS Hard Disk Password

Not as output object

As output object

Note) In case of virtual PC, since the hardware is Unable to Audit, the Hardware Type will be displayed as Virtual PC, and Hardware will be displayed as - in the report.


OS (System)

Information

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

Automatic Logon

Not as output object

As output object

Welcome To Use

Not as output object

Not as output object

Last User Name

Not as output object

Not as output object

Security of Guest Account

Not as output object

As output object

Settings of Automatic Update

Not as output object

Not as output object

User Account Control (UAC)

Not as output object

Not as output object

Insecure Shared Folder

Not as output object

As output object

Require a Password on Wakeup

Not as output object

Not as output object

Set Complicated Password Required

Not as output object

Not as output object


OS (User)

Information

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

Screen Saver

Not as output object

As output object

Screen Saver Password

Not as output object

As output object

Password of Logon User

Not as output object

As output object


Internet Explorer

Information

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

Internet Zone

As output object

As output object


Introduction of Audit Software

Information

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

Check whether Systemwalker Desktop Patrol CT is installed (whether inventory information is collected)

As output object

As output object


Windows Update Program

Setting Item

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

Check the patch installation status using the patch distribution information managed by Systemwalker Desktop Patrol

As output object

As output object


Anti-virus Software

Information

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

Installation of Anti-virus Software

As output object

As output object

Real-time Scan Status of Anti-virus Software

As output object

As output object

Scheduled Scan Status of Anti-virus Software

Not as output object

Not as output object

Scan Scope of Anti-virus Software

Not as output object

Not as output object


Status of Anti-virus Software Virus Pattern

Information

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

Check whether the latest virus pattern has been applied

As output object

As output object


Access Control

It can be used after Systemwalker Desktop KeeperV13.0.0 or later has been installed.

Information

Content

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

File Export Prohibition

Unable to collect

Not as output object

Not as output object

No

Normal export

Encrypted export

Unable to export

Printing Prohibition

Unable to collect

Not as output object

Not as output object

No

Yes

PrintScreen Key Prohibition

Unable to collect

Not as output object

Not as output object

No

Yes

Logon Prohibition

Unable to collect

Not as output object

Not as output object

No

Yes

Application Startup Prohibition

Unable to collect

Not as output object

Not as output object

No

Yes

E-mail File Attachment Prohibition

Unable to collect

Not as output object

Not as output object

No

Allow encrypted file only

Prohibit specified extensions only

Allow specified extensions only

Application Startup Log

Unable to collect

Not as output object

Not as output object

No

Yes

Application Termination Log

Unable to collect

Not as output object

Not as output object

No

Yes

Window Title Obtaining Log

Unable to collect

Not as output object

Not as output object

No

Yes

E-mail Sending Log

Unable to collect

Not as output object

Not as output object

No

Yes

Command operation log

Unable to collect

Not as output object

Not as output object

No

Yes

Device Configuration Change Log

Unable to collect

Not as output object

Not as output object

No

Yes

Printing operation log

Unable to collect

Not as output object

Not as output object

No

Yes

File Export Log

Unable to collect

Not as output object

Not as output object

No

Yes

File Operation Log

Unable to collect

Not as output object

Not as output object

No

Yes

Logon/Logoff Log

Unable to collect

Not as output object

Not as output object

No

Yes

External Application log

Unable to collect

Not as output object

Not as output object

No

Yes

PrintScreen Key Operation log

Unable to collect

Not as output object

Not as output object

No

Yes

File Export Utility

Unable to collect

Not as output object

Not as output object

Normal export

Encrypted export

Unable to export

Reading prohibition of removable drive

Unable to collect

Not as output object

Not as output object

No

Yes

USB Device Individual Identification

Unable to collect

Not as output object

Not as output object

No

Yes

Web Operation Log

Unable to collect

Not as output object

Not as output object

No

Yes

FTP Operation Log

Unable to collect

Not as output object

Not as output object

No

Yes

Confirmation of Recipient Address

Unable to collect

Not as output object

Not as output object

No

Yes

URL Access Prohibition

Unable to collect

Not as output object

Not as output object

No

Yes

FTP Server Connection Prohibition

Unable to collect

Not as output object

Not as output object

No

Yes

Web Download Prohibition

Unable to collect

Not as output object

Not as output object

No

Yes


Application

Information

Initial Value of Recommended Auditing Indicator

Vulnerability Countermeasure

Information Disclosure

Firewall

As output object

As output object

Adoption of Encryption software

Not as output object

Not as output object

Google Desktop Search Across Computers

Not as output object

As output object

Detection of Banned Software Status

Not as output object

Not as output object


For the settings of whether to perform auditing of each auditing items, refer to "4.2.2.1 Set the Auditing Items of Security Settings".

In addition, the auditing result output in the security auditing report is consistent with the auditing result in the diagnosis result of operation settings (security auditing). For judgment method, refer to "Diagnosis Result" of "4.3.1.2 Structure of Security Diagnosis Result Window".

For PC imported through linking with other products of Systemwalker Desktop Patrol, the auditing result is as follows.