Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -6,45 +6,50 @@ sidebar_position: 80

# Windows File Server Activity Auditing Configuration

In order for the Netwrix Activity Monitor to monitor Windows file server activity, an Activity Agent
must be deployed to the server. It cannot be deployed to a proxy server. However, additional
considerations are needed when targeting a Windows File System Clusters or DFS Namespaces.
In order for the Netwrix Activity Monitor to monitor Windows file server activity, an Activity Agent must be deployed to the server. It cannot be deployed to a proxy server. However, additional considerations are needed when targeting a Windows File System Clusters.

## Windows File System Clusters

In order to monitor a Windows File System Cluster, an Activity Agent needs to be deployed on all
nodes that comprise the Windows File System Cluster. The credential used to deploy the Activity
Agent must have the following permissions on the server:
In order to monitor a Windows File System Cluster, an Activity Agent needs to be deployed on all nodes that comprise the Windows File System Cluster. The credential used to deploy the Activity Agent must have the following permissions on the server:

- Membership in the local Administrators group
- READ and WRITE access to the archive location for Archiving feature only

It is also necessary to enable the Remote Registry Service on the Activity Agent server.

For integration between the Activity Monitor and Access Analyzer, the credential used by Access
Analyzer to read the activity log files must have also have this permission.
For integration between the Activity Monitor and Access Analyzer, the credential used by Access Analyzer to read the activity log files must have also have this permission.

After the agent has been deployed, it is necessary to modify the HOST parameter in the
`SBTFilemon.ini` file to be the name of the cluster. For integration with Netwrix Access Analyzer
, this must be an exact match to the name of the cluster in the Master Host Table.
### Single Role (Basic) Setup

## DFS Namespaces
![Single Role Cluster Overview](/images/activitymonitor/9.0/requirements/WinCluster1.webp)

In order to monitor activity on DFS Namespaces, an Activity Agent needs to be deployed on all DFS
servers.
1. Install an Activity Monitor agent on all nodes in the cluster.
2. Configure a Monitored Host with event source type of “Agent’s Windows host” for each node.

:::note
The FileSystem > 0.Collection > 0-FSDFS System Scans Job in Netwrix Access Analyzer
can be used to identify all DFS servers.
:::
![Single Role WinCluster Agents](/images/activitymonitor/9.0/requirements/WinCluster2.webp)

![Single Role WinCluster Monitored Hosts](/images/activitymonitor/9.0/requirements/WinCluster3.webp)

The credential used to deploy the Activity Agent must have the following permissions on the server:
### Multi-Role (Advanced) Setup

- Membership in the local Administrators group
- READ and WRITE access to the archive location for Archiving feature only
![Multi Role Cluster Overview](/images/activitymonitor/9.0/requirements/WinCluster4.webp)

It is also necessary to enable the Remote Registry Service on the Activity Agent server.

For integration between the Activity Monitor and Access Analyzer, the credential used by Access
Analyzer to read the activity log files must have also have this permission.
1. Install an Activity Monitor agent on all nodes in the cluster.
2. Configure a Monitored Host with event source type of “Agent’s Windows host” for each node.
3. On the Additional Properties tab of each file output, set the *Report hostname as* value to match the Role Server it will be scoped for.
4. On the Path Filtering tab of each file output, scope the log to only look at the shares for their respective role servers.

:::note Example
The cluster contains **RoleServerA** and **RoleServerB**. RoleServerA contains two shares: Share1 & Share2. RoleServerB contains two shares: Share3 & Share4.
1. There should be two File Outputs under Node1 & Node2 to match the two Role Servers.
2. The first file output should contain scoping that includes Share1 & Share2, but excludes all others.
3. The second file output should contain scoping that includes Share3 & Share4, but excludes all others.

![Multi Role WinCluster Agents](/images/activitymonitor/9.0/requirements/WinCluster5.webp)

![Multi Role WinCluster Monitored Hosts](/images/activitymonitor/9.0/requirements/WinCluster6.webp)

![Multi Role WinCluster Output Properties](/images/activitymonitor/9.0/requirements/WinCluster7.webp)
:::

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading