ONTAP 90 SMBCIFS and NFS Auditing and Security
ONTAP 90 SMBCIFS and NFS Auditing and Security
Contents
Deciding whether to use this guide ............................................................. 6
Auditing NAS events on SVMs with FlexVol volumes .............................. 8
How auditing works .................................................................................................... 8
Basic auditing concepts ................................................................................... 8
How ONTAP auditing process works ............................................................. 9
Aggregate space considerations when enabling auditing .............................. 11
Auditing requirements and considerations ................................................................ 11
What the supported audit event log formats are ........................................................ 12
Viewing audit event logs ........................................................................................... 12
How active audit logs are viewed using Event Viewer ................................. 13
SMB events that can be audited ................................................................................ 13
Determining what the complete path to the audited object is ....................... 15
Considerations when auditing symlinks and hard links ................................ 16
Considerations when auditing alternate NTFS data streams ......................... 17
NFS file and directory access events that can be audited .......................................... 18
Planning the auditing configuration .......................................................................... 19
Creating a file and directory auditing configuration on SVMs ................................. 23
Creating the auditing configuration ............................................................... 23
Enabling auditing on the SVM ...................................................................... 25
Verifying the auditing configuration ............................................................. 25
Configuring file and folder audit policies ................................................................. 26
Configuring audit policies on NTFS security-style files and directories ...... 26
Configuring auditing for UNIX security style files and directories .............. 29
Displaying information about audit policies applied to files and directories ............ 30
Displaying information about audit policies using the Windows Security
tab ............................................................................................................ 30
Displaying information about NTFS audit policies on FlexVol volumes
using the CLI ........................................................................................... 31
Ways to display information about file security and audit policies .............. 33
CLI change events that can be audited ...................................................................... 34
How to manage file-share event .................................................................... 37
How to manage audit-policy-change event ................................................... 37
How to manage user-account event ............................................................... 37
How to manage security-group event ............................................................ 38
How to manage authorization-policy-change event ...................................... 39
Managing auditing configurations ............................................................................. 39
Manually rotating the audit event logs .......................................................... 40
Enabling and disabling auditing on SVMs .................................................... 40
Displaying information about auditing configurations ................................. 41
Commands for modifying auditing configurations ....................................... 42
Deleting an auditing configuration ................................................................ 43
4 | SMB/CIFS and NFS Auditing and Security Tracing Guide
• Basic SMB/CIFS and NFS protocol file access has been configured.
• You want to create and maintain an auditing configuration using one of the following methods:
If you want to create a basic configuration using best practices, and you do not want a lot of
conceptual background, you should choose among the following documentation:
• Data ONTAP CIFS/SMB Server Configuration Express Guide (basic configuration using
OnCommand System Manager)
SMB/CIFS configuration express
• Data ONTAP Multiprotocol Server Configuration Express Guide (basic configuration using
OnCommand System Manager)
SMB/CIFS and NFS multiprotocol express configuration
• Data ONTAP NFSv3 Server Configuration Express Guide (basic configuration using
OnCommand System Manager)
NFS express configuration
• NFS Configuration Power Guide (advanced configuration using the CLI)
NFS configuration
If you want general information about SMB/CIFS and NFS protocol support in ONTAP, you
should choose among the following documentation:
• SMB/CIFS management
• NFS management
If you require additional configuration or conceptual information, you should choose among the
following documentation:
• Technical Reports (TRs), which include additional information about ONTAP technology and
interaction with external services
• NetApp Technical Report 4067: Clustered Data ONTAP Best Practice and NFS Implementation
Guide
• NetApp Technical Report 4189: Clustered Data ONTAP CIFS Auditing Quick Start Guide
• NetApp Technical Report 4191: Best Practices Guide for Clustered Data ONTAP 8.2 Windows
File Services
• NetApp Technical Report 4479: FPolicy Solution Guide for Clustered Data ONTAP: Northern
Storage Suite (NSS)
8
CIFS events
You can audit the following events:
NFS events
You can audit file and directory NFSv4 access events on objects stored on SVMs with FlexVol
volumes.
Related concepts
SMB events that can be audited on page 13
Staging volume
A dedicated volume created by Data ONTAP to store staging files. There is one staging
volume per aggregate. Staging volumes are shared by all audit-enabled Storage Virtual
Machines (SVMs) to store audit records of data access for data volumes in that particular
aggregate. Each SVM's audit records are stored in a separate directory within the staging
volume.
Cluster administrators can view information about staging volumes, but most other
volume operations are not permitted. Only clustered Data ONTAP can create staging
volumes. Clustered Data ONTAP automatically assigns a name to staging volumes. All
staging volume names begin with MDV_aud_ followed by the UUID of the aggregate
containing that staging volume (for example:
MDV_aud_1d0131843d4811e296fc123478563412.)
System volumes
A FlexVol volume that contains special metadata, such as metadata for file services audit
logs. The admin SVM owns system volumes, which are visible across the cluster. Staging
volumes are a type of system volume.
Consolidation task
A task that gets created when auditing is enabled. This long-running task on each SVM
takes the audit records from staging files across the member nodes of the SVM. This task
merges the audit records in sorted chronological order, and then converts them to a user-
readable event log format specified in the auditing configuration—either the EVTX or
XML file format. The converted event logs are stored in the audit event log directory that
is specified in the SVM auditing configuration.
• The auditing subsystem verifies that the log directory path is available and does not contain
symlinks.
The log directory must already exist. The auditing subsystem does not assign a default log file
location. If the log directory path specified in the auditing configuration is not a valid path,
auditing configuration creation fails with the following error:
The specified path "/<path>" does not exist in the namespace belonging
to Vserver "<Vserver_name>"
Configuration creation fails if the directory exists but contains symlinks.
After this task is scheduled, auditing is enabled. The SVM auditing configuration and the log files
persist across a reboot or if the NFS or CIFS servers are stopped or restarted.
10 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Guaranteed auditing
By default, auditing is guaranteed. ONTAP guarantees that all auditable file access events (as
specified by configured audit policy ACLs) are recorded, even if a node is unavailable. A requested
file operation cannot be completed until the audit record for that operation is saved to the staging
volume on persistent storage. If audit records cannot be committed to the disk in the staging files,
either because of insufficient space or because of other issues, client operations are denied.
• If the staging volume is available through the SFO partner, the staging volumes last reported from
the node are scanned, and consolidation proceeds normally.
• If the SFO partner is not available, the task creates a partial log file.
When a node is not reachable, the consolidation task consolidates the audit records from the other
available nodes of that SVM. To identify that it is not complete, the task adds the
suffix .partial to the consolidated file name.
• After the unavailable node is available, the audit records in that node are consolidated with the
audit records from the other nodes at that point of time.
Related concepts
Basic auditing concepts on page 8
What the supported audit event log formats are on page 12
SMB events that can be audited on page 13
Auditing NAS events on SVMs with FlexVol volumes | 11
Related tasks
Creating a file and directory auditing configuration on SVMs on page 23
Related references
NFS file and directory access events that can be audited on page 18
Related concepts
Troubleshooting auditing and staging volume space issues on page 44
• For NFS auditing, there is no mapping between mode bits and auditing ACEs.
When converting ACLs to mode bits, auditing ACEs are skipped. When converting mode bits to
ACLs, auditing ACEs are not generated.
• The directory specified in the auditing configuration must meet the following requirements:
• Auditing is dependent on having available space in the volume containing the directory where
converted event logs are stored.
12 | SMB/CIFS and NFS Auditing and Security Tracing Guide
You must be aware of and have a plan for ensuring that there is sufficient space in the volumes
used to store event logs. You can specify the number of event logs to retain in the auditing
directory by using the -rotate-limit parameter when creating an auditing configuration,
which can help to ensure that there is enough available space for the event logs in the volume.
• Although you can enable central access policy staging in the auditing configuration without
enabling Dynamic Access Control on the CIFS server, Dynamic Access Control must be enabled
to generate central access policy staging events.
Dynamic Access Control is not enabled by default.
Related concepts
Planning the auditing configuration on page 19
Related concepts
Viewing audit event logs on page 12
How active audit logs are viewed using Event Viewer on page 13
◦ General view
Information that is common to all events is displayed for the event record. In this version of
ONTAP, the event-specific data for the event record is not displayed. You can use the detailed
view to display event-specific data.
◦ Detailed view
A friendly view and a XML view are available. The friendly view and the XML view display
both the information that is common to all events and the event-specific data for the event
record.
Related concepts
How ONTAP auditing process works on page 9
How active audit logs are viewed using Event Viewer on page 13
Auditing NAS events on SVMs with FlexVol volumes | 13
Related tasks
Determining what the complete path to the audited object is on page 15
Manually rotating the audit event logs on page 40
Note: This information is applicable only for EVTX event logs. XML event logs can be viewed
through SMB in a browser or through NFS using any XML editor or viewer.
NA/4664 Hard link OBJECT ACCESS: An attempt was made to File Access
create a hard link.
4670 DACL changes
4907 SACL changes
4913
NA/4818 Proposed central OBJECT ACCESS: Central Access Policy File Access
access policy Staging.
does not grant
the same access
permissions as
the current
central access
policy
Auditing NAS events on SVMs with FlexVol volumes | 15
• If the open event is an open request to create a new object (file or directory), the HandleID tag in
the audit XML event shows an empty HandleID (for example: <Data
Name="HandleID">00000000000000;00;00000000;00000000</Data> ).
The HandleID is empty because the OPEN (for creating a new object) request gets audited
before the actual object creation happens and before a handle exists. Subsequent audited events
for the same object have the right object handle in the HandleID tag.
• If the open event is an open request to open an existing object, the audit event will have the
assigned handle of that object in the HandleID tag (for example: <Data
Name="HandleID">00000000000401;00;000000ea;00123ed4</Data> ).
Related concepts
Configuring audit policies on NTFS security-style files and directories on page 26
Related tasks
Determining what the complete path to the audited object is on page 15
Steps
1. Determine what the volume name and relative path to audited object is by looking at the
<ObjectName> tag in the audit event.
Example
In this example, the volume name is “data1” and the relative path to the file is /dir1/file.txt:
<Data Name="ObjectName">(data1);/dir1/file.txt </Data>
2. Using the volume name determined in the previous step, determine what the junction path is for
the volume containing the audited object:
16 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Example
In this example, the volume name is “data1” and the junction path for the volume containing the
audited object is /data/data1:
volume show -junction -volume data1
Junction Junction
Vserver Volume Language Active Junction Path Path Source
--------- ------------ -------- -------- ----------------- -----------
vs1 data1 en_US.UTF-8
true /data/data1 RW_volume
3. Determine the full path to the audited object by appending the relative path found in the
<ObjectName> tag to the junction path for the volume.
Example
In this example, the junction path for the volume:
/data/data1/dir1/file.text
Symlinks
A symlink is a file with a separate inode that contains a pointer to the location of a destination object,
known as the target. When accessing an object through a symlink, ONTAP automatically interprets
the symlink and follows the actual canonical protocol agnostic path to the target object in the volume.
In the following example output, there are two symlinks, both pointing to a file named target.txt.
One of the symlinks is a relative symlink and one is an absolute symlink. If either of the symlinks are
audited, the ObjectName tag in the audit event contains the path to the file target.txt:
[root@host1 audit]# ls -l
total 0
lrwxrwxrwx 1 user1 group1 37 Apr 2 10:09 softlink_fullpath.txt -> /data/
audit/target.txt
lrwxrwxrwx 1 user1 group1 10 Apr 2 09:54 softlink.txt -> target.txt
-rwxrwxrwx 1 user1 group1 16 Apr 2 10:05 target.txt
Hard links
A hard link is a directory entry that associates a name with an existing file on a file system. The hard
link points to the inode location of the original file. Similar to how ONTAP interprets symlinks,
ONTAP interprets the hard link and follows the actual canonical path to the target object in the
volume. When access to a hard link object is audited, the audit event records this absolute canonical
path in the ObjectName tag rather than the hard link path.
Auditing NAS events on SVMs with FlexVol volumes | 17
◦ The handle of the alternate data stream is recorded in the HandleID tag.
• EVTX ID: 4663 events (all other audit events, such as read, write, getattr, and so on)
◦ The path of the base file, not the alternate data stream, is recorded in the ObjectName tag.
◦ The handle of the alternate data stream is recorded in the HandleID tag.
Example
The following example illustrates how to identify EVTX ID: 4663 events for alternate data streams
using the HandleID tag. Even though the ObjectName tag (path) recorded in the read audit event is
to the base file path, the HandleID tag can be used to identify the event as an audit record for the
alternate data stream.
Stream file names take the form base_file_name:stream_name. In this example, the dir1
directory contains a base file with an alternate data stream having the following paths:
/dir1/file1.txt
/dir1/file1.txt:stream1
Note: The output in the following event example is truncated as indicated; the output does not
display all of the available output tags for the events.
For an EVTX ID 4656 (open audit event), the audit record output for the alternate data stream
records the alternate data stream name in the ObjectName tag:
- <Event>
- <System>
<Provider Name="Netapp-Security-Auditing" />
<EventID>4656</EventID>
<EventName>Open Object</EventName>
[...]
</System>
- <EventData>
[...]
<Data Name="ObjectType">Stream</Data>
<Data Name="HandleID">00000000000401;00;000001e4;00176767</Data>
<Data Name="ObjectName">(data1);/dir1/file1.txt:stream1</
Data>
[...]
</EventData>
</Event>
- <Event>
18 | SMB/CIFS and NFS Auditing and Security Tracing Guide
For an EVTX ID 4663 (read audit event), the audit record output for the same alternate data stream
records the base file name in the ObjectName tag; however, the handle in the HandleID tag is the
alternative data stream's handle and can be used to correlate this event with the alternative data
stream:
- <Event>
- <System>
<Provider Name="Netapp-Security-Auditing" />
<EventID>4663</EventID>
<EventName>Read Object</EventName>
[...]
</System>
- <EventData>
[...]
<Data Name="ObjectType">Stream</Data>
<Data Name="HandleID">00000000000401;00;000001e4;00176767</Data>
<Data Name="ObjectName">(data1);/dir1/file1.txt</Data>
[...]
</EventData>
</Event>
- <Event>
• READ
• OPEN
• CLOSE
• READDIR
• WRITE
• SETATTR
• CREATE
• LINK
• OPENATTR
• REMOVE
• GETATTR
• VERIFY
• NVERIFY
• RENAME
To reliably audit NFS RENAME events, you should set audit ACEs on directories instead of files
because file permissions are not checked for a RENAME operation if the directory permissions are
sufficient.
Auditing NAS events on SVMs with FlexVol volumes | 19
Related tasks
Configuring auditing for UNIX security style files and directories on page 29
Determining what the complete path to the audited object is on page 15
• If you configure time-based log rotation parameters, logs are rotated based on the configured
schedule instead of log size.
• If you specify only one or two time-based rotation parameters (for example, -rotate-
schedule-month and -rotate-schedule-minutes), the log files are rotated based on the
minute values that you specified on all days of the week, during all hours, but only during the
specified months.
For example, you can specify that the audit log is to be rotated during the months January, March,
and August on all Mondays, Wednesdays, and Saturdays at 10:30 a.m.
You can use the following list of available auditing parameters to determine what values to use for
configuring a schedule for audit event log rotations:
Related concepts
Configuring file and folder audit policies on page 26
Auditing requirements and considerations on page 11
What the supported audit event log formats are on page 12
Auditing NAS events on SVMs with FlexVol volumes | 23
Related tasks
Creating a file and directory auditing configuration on SVMs on page 23
Steps
1. Creating the auditing configuration on page 23
Before you can begin auditing file and directory events, you must create an auditing configuration
on the Storage Virtual Machine (SVM).
2. Enabling auditing on the SVM on page 25
After you finish setting up the auditing configuration, you must enable auditing on the Storage
Virtual Machine (SVM).
3. Verifying the auditing configuration on page 25
After completing the auditing configuration, you should verify that auditing is configured properly
and is enabled.
Related concepts
Planning the auditing configuration on page 19
How to configure NTFS audit policies using the ONTAP CLI on page 29
Managing auditing configurations on page 39
Related tasks
Configuring NTFS audit policies using the Windows Security tab on page 26
Configuring auditing for UNIX security style files and directories on page 29
Enabling and disabling auditing on SVMs on page 40
Deleting an auditing configuration on page 43
Manually rotating the audit event logs on page 40
• Although you can enable central access policy staging in the auditing configuration without
enabling Dynamic Access Control on the CIFS server, central access policy staging events are
generated only if Dynamic Access Control is enabled.
Dynamic Access Control is enabled through a CIFS server option. It is not enabled by default.
• If the arguments of a field in a command is invalid, for example, invalid entries for fields,
duplicate entries, and non-existent entries, then the command fails before the audit phase.
24 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Step
1. Using the information in the planning worksheet, create the auditing configuration to rotate audit
logs based on log size or a schedule:
Examples
The following example creates an auditing configuration that audits file operations and CIFS
logon and logoff events (the default) using size-based rotation. The log format is EVTX (the
default). The logs are stored in the /audit_log directory. The log file size limit is 200 MB.
The logs are rotated when they reach 200 MB in size:
The following example creates an auditing configuration that audits file operations and CIFS
logon and logoff events (the default) using size-based rotation. The log format is EVTX (the
default). The log file size limit is 100 MB (the default), and the log rotation limit is 5:
The following example creates an auditing configuration that audits file operations, CIFS
logon and logoff events, and central access policy staging events using time-based rotation.
The log format is EVTX (the default). The audit logs are rotated monthly, at 12:30 p.m. on all
days of the week. The log rotation limit is 5:
Auditing NAS events on SVMs with FlexVol volumes | 25
Step
Example
vserver audit enable -vserver vs1
Step
Example
The following command displays in list form all auditing configuration information for Storage
Virtual Machine (SVM) vs1:
vserver audit show -instance -vserver vs1
Vserver: vs1
Auditing state: true
Log Destination Path: /audit_log
Categories of Events to Audit: file-ops
Log Format: evtx
Log File Size Limit: 200MB
Log Rotation Schedule: Month: -
Log Rotation Schedule: Day of Week: -
Log Rotation Schedule: Day: -
26 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Related concepts
How ONTAP auditing process works on page 9
SMB events that can be audited on page 13
Displaying information about audit policies applied to files and directories on page 30
Steps
1. From the Tools menu in Windows Explorer, select Map network drive.
b. In the Folder box, type the CIFS server name that contains the share holding the data you
want to audit and the name of the share.
You can specify the IP address of the data interface for the CIFS server instead of the CIFS
server name.
Example
If your CIFS server name is “CIFS_SERVER” and your share is named “share1”, you should
enter \\CIFS_SERVER\share1.
c. Click Finish.
The drive you selected is mounted and ready with the Windows Explorer window displaying files
and folders contained within the share.
3. Select the file or directory for which you want to enable auditing access.
6. Click Advanced.
c. Click OK.
b. Click Remove.
c. Click OK.
b. Click Edit.
c. Click OK.
If you are setting up auditing on a user or group or changing auditing on an existing user or
group, the Auditing Entry for <object> box opens.
9. In the Apply to box, select how you want to apply this auditing entry.
You can select one of the following:
• Subfolders only
• Files only
If you are setting up auditing on a single file, the Apply to box is not active. The Apply to box
setting defaults to This object only.
Note: Because auditing takes SVM resources, select only the minimal level that provides the
auditing events that meet your security requirements.
10. In the Access box, select what you want audited and whether you want to audit successful events,
failure events, or both.
• Full control
• Read attributes
• Write attributes
• Delete
• Read permissions
• Change permissions
• Take ownership
11. If you do not want the auditing setting to propagate to subsequent files and folders of the original
container, select the Apply these auditing entries to objects and/or containers within this
container only box.
13. After you finish adding, removing, or editing auditing entries, click OK.
The Auditing Entry for <object> box closes.
Auditing NAS events on SVMs with FlexVol volumes | 29
14. In the Auditing box, select the inheritance settings for this folder.
Select only the minimal level that provides the auditing events that meet your security
requirements. You can choose one of the following:
• Select the Include inheritable auditing entries from this object's parent box.
• Select the Replace all existing inheritable auditing entries on all descendants with inheritable
auditing entries from this object box.
If you are setting SACLs on a single file, the Replace all existing inheritable auditing entries on
all descendants with inheritable auditing entries from this object box is not present in the
Auditing box.
Related concepts
SMB events that can be audited on page 13
Related tasks
Displaying information about audit policies using the Windows Security tab on page 30
Related concepts
SMB events that can be audited on page 13
Steps
1. Retrieve the existing ACL for the file or directory by using the nfs4_getfacl or equivalent
command.
For more information about manipulating ACLs, see the man pages of your NFS client.
3. Apply the updated ACL to the file or directory by using the nfs4_setfacl or equivalent
command.
Related references
NFS file and directory access events that can be audited on page 18
Related concepts
Configuring file and folder audit policies on page 26
Displaying information about audit policies using the Windows Security tab
You can display information about audit policies that have been applied to files and directories by
using the Security tab in the Windows Properties window. This is the same method used for data
residing on a Windows server, which enables customers to use the same GUI interface that they are
accustomed to using.
Steps
1. From the Tools menu in Windows Explorer, select Map network drive.
b. In the Folder box, type the IP address or CIFS server name of the Storage Virtual Machine
(SVM) containing the share that holds both the data you would like to audit and the name of
the share.
Example
If your CIFS server name is “CIFS_SERVER” and your share is named “share1”, you should
enter \\CIFS_SERVER\share1.
Note: You can specify the IP address of the data interface for the CIFS server instead of the
CIFS server name.
c. Click Finish.
Auditing NAS events on SVMs with FlexVol volumes | 31
The drive you selected is mounted and ready with the Windows Explorer window displaying files
and folders contained within the share.
3. Select the file or directory for which you display auditing information.
6. Click Advanced.
8. Click Continue.
The Auditing box opens. The Auditing entries box displays a summary of users and groups that
have SACLs applied to them.
9. In the Auditing entries box select the user or group whose SACL entries you want displayed.
11. In the Access box, view the current SACLs that are applied to the selected object.
12. Click Cancel to close the Auditing entry for <object> box.
• NTFS security-style volumes and qtrees use only NTFS system access control lists (SACLs) for
audit policies.
• Files and folders in a mixed security-style volume with NTFS effective security can have NTFS
audit policies applied to them.
Mixed security-style volumes and qtrees can contain some files and directories that use UNIX file
permissions, either mode bits or NFSv4 ACLs, and some files and directories that use NTFS file
permissions.
• The top level of a mixed security-style volume can have either UNIX or NTFS effective security
and might or might not contain NTFS SACLs.
• If the path that is entered in the command is to data with NTFS effective security, the output also
displays information about Dynamic Access Control ACEs if Dynamic Access Control is
configured for the given file or directory path.
• When displaying security information about files and folders with NTFS effective security,
UNIX-related output fields contain display-only UNIX file permission information.
NTFS security-style files and folders use only NTFS file permissions and Windows users and
groups when determining file access rights.
• ACL output is displayed only for files and folders with NTFS or NFSv4 security.
This field is empty for files and folders using UNIX security that have only mode bit permissions
applied (no NFSv4 ACLs).
• The owner and group output fields in the ACL output apply only in the case of NTFS security
descriptors.
Step
1. Display file and directory audit policy settings with the desired level of detail:
If you want to display Enter the following command...
information...
Examples
The following example displays the audit policy information for the path /corp in SVM vs1.
The path has NTFS effective security. The NTFS security descriptor contains both a SUCCESS
and a SUCCESS/FAIL SACL entry.
The following example displays the audit policy information for the path /datavol1 in SVM
vs1. The path contains both regular file and folder SACLs and Storage-Level Access Guard
SACLs.
Vserver: vs1
File Path: /datavol1
File Inode Number: 77
Security Style: ntfs
Auditing NAS events on SVMs with FlexVol volumes | 33
Example
The following command with the wildcard character displays the information about all files
and directories below the path /1/ of SVM vs1:
Vserver: vs1
File Path: /1/1
Security Style: mixed
Effective Style: ntfs
DOS Attributes: 10
DOS Attributes in Text: ----D---
Expanded Dos Attributes: -
Unix User Id: 0
Unix Group Id: 0
Unix Mode Bits: 777
Unix Mode Bits in Text: rwxrwxrwx
ACLs: NTFS Security Descriptor
Control:0x8514
Owner:BUILTIN\Administrators
Group:BUILTIN\Administrators
DACL - ACEs
ALLOW-Everyone-0x1f01ff-OI|CI (Inherited)
Vserver: vs1
File Path: /1/1/abc
Security Style: mixed
Effective Style: ntfs
DOS Attributes: 10
DOS Attributes in Text: ----D---
Expanded Dos Attributes: -
Unix User Id: 0
Unix Group Id: 0
34 | SMB/CIFS and NFS Auditing and Security Tracing Guide
The following command displays the information of a file named as "*" under the path /
vol1/a of SVM vs1. The path is enclosed within double quotes (" ").
Vserver: vs1
File Path: “/vol1/a/*”
Security Style: mixed
Effective Style: unix
DOS Attributes: 10
DOS Attributes in Text: ----D---
Expanded Dos Attributes: -
Unix User Id: 1002
Unix Group Id: 65533
Unix Mode Bits: 755
Unix Mode Bits in Text: rwxr-xr-x
ACLs: NFSV4 Security Descriptor
Control:0x8014
SACL - ACEs
AUDIT-EVERYONE@-0x1f01bf-FI|DI|SA|FA
DACL - ACEs
ALLOW-EVERYONE@-0x1f00a9-FI|DI
ALLOW-OWNER@-0x1f01ff-FI|DI
ALLOW-GROUP@-0x1200a9-IG
The following example displays a file-share event with the ID 5143 is generated, when a share
object called 'audit_dest' is created:
The following example displays an audit-policy change event with the ID 4719 generated,
when an audit is disabled:
disabled or modified, and local CIFS user password is reset or changed. The user-account events are
generated when a user account is modified using vserver cifs users-and-groups <local
user> and vserver services name-service <unix user> commands.
The following example displays an user account event with the ID 4720 generated, when a
local CIFS user is created:
- System
- Provider
[ Name] NetApp-Security-Auditing
[ Guid] {3CB2A168-FE19-4A4E-BDAD-DCF422F13473}
EventID 4720
EventName Local Cifs User Created
...
...
TargetUserName testuser
TargetDomainName NETAPP-CLUS1
TargetSid S-1-5-21-2447422786-1297661003-4197201688-1003
TargetType CIFS
DisplayName testuser
PasswordLastSet 1472662216
AccountExpires NO
PrimaryGroupId 513
UserAccountControl %%0200
SidHistory ~
PrivilegeList ~
The following example displays an user account event with the ID 4781 generated, when the
local CIFS user created in the preceding example is renamed:
The following example displays a security group event with the ID 4731 generated, when a
local UNIX security group is created:
Auditing NAS events on SVMs with FlexVol volumes | 39
The following example displays an authorization policy event with the ID 4704 generated,
when the authorization rights for a CIFS user group are assigned:
Related concepts
Troubleshooting auditing and staging volume space issues on page 44
40 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Step
1. Rotate the audit event logs by using the vserver audit rotate-log command.
Example
vserver audit rotate-log -vserver vs1
The audit event log is saved in the SVM audit event log directory with the format specified by the
auditing configuration (XML or EVTX), and can be viewed by using the appropriate application.
Related concepts
Viewing audit event logs on page 12
Related tasks
Creating a file and directory auditing configuration on SVMs on page 23
Steps
Examples
The following example enables auditing for SVM vs1:
Vserver: vs1
Auditing state: true
Auditing NAS events on SVMs with FlexVol volumes | 41
Vserver: vs1
Auditing state: false
Log Destination Path: /audit_log
Categories of Events to Audit: file-ops, cifs-logon-logoff
Log Format: evtx
Log File Size Limit: 100MB
Log Rotation Schedule: Month: -
Log Rotation Schedule: Day of Week: -
Log Rotation Schedule: Day: -
Log Rotation Schedule: Hour: -
Log Rotation Schedule: Minute: -
Rotation Schedules: -
Log Files Rotation Limit: 10
Related tasks
Deleting an auditing configuration on page 43
• The target directory where the auditing subsystem stores consolidated and converted audit logs
Step
1. Display information about the auditing configuration by using the vserver audit show
command.
For more information about using the command, see the man pages.
42 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Examples
The following example displays a summary of the auditing configuration for all SVMs:
The following example displays, in list form, all auditing configuration information for all
SVMs:
Vserver: vs1
Auditing state: true
Log Destination Path: /audit_log
Categories of Events to Audit: file-ops
Log Format: evtx
Log File Size Limit: 100MB
Log Rotation Schedule: Month: -
Log Rotation Schedule: Day of Week: -
Log Rotation Schedule: Day: -
Log Rotation Schedule: Hour: -
Log Rotation Schedule: Minute: -
Rotation Schedules: -
Log Files Rotation Limit: 0
Related tasks
Creating a file and directory auditing configuration on SVMs on page 23
If you want to... Use this command... For more information, see...
Modify the log vserver audit modify
destination path with the -destination
parameter
Modify the category of vserver audit modify
events to audit with the -events parameter
Note: To audit central
access policy staging events,
the Dynamic Access Control
(DAC) CIFS server option
must be enabled on the
Storage Virtual Machine
(SVM).
If you want to... Use this command... For more information, see...
Enabling automatic vserver audit modify
saves based on a time with the -rotate-
interval schedule-month, -rotate-
schedule-dayofweek, -
rotate-schedule-day, -
rotate-schedule-hour,
and -rotate-schedule-
minute parameters
Steps
Example
vserver audit disable -vserver vs1
Example
vserver audit delete -vserver vs1
Related tasks
Enabling and disabling auditing on SVMs on page 40
Reverting to a version of clustered Data ONTAP that does not support the auditing of
CIFS logon and logoff events and central access policy staging events
Support for auditing of CIFS logon and logoff events and for central access policy staging events
starts with clustered Data ONTAP 8.3. If you are reverting to a version of clustered Data ONTAP that
does not support these event types and you have auditing configurations that monitor these event
types, you must change the auditing configuration for those audit-enabled SVMs before reverting.
You must modify the configuration so that only file-op events are audited.
Related tasks
Enabling and disabling auditing on SVMs on page 40
44 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Related concepts
Aggregate space considerations when enabling auditing on page 11
• Storage Virtual Machine (SVM) and cluster administrators can determine whether there is
insufficient volume space by displaying information about volume and aggregate usage and
configuration.
• If there is insufficient space in the volumes containing event logs, SVM and cluster administrators
can resolve the space issues by either removing some of the event log files or by increasing the
size of the volume.
Note: If the aggregate that contains the event log volume is full, then the size of the aggregate
must be increased before you can increase the size of the volume. Only a cluster administrator
can increase the size of an aggregate.
• The destination path for the event log files can be changed to a directory on another volume by
modifying the auditing configuration.
Note: Data access is denied in the following cases:
◦ If the file limit on a volume, which hosts the destination directory, reaches to its maximum
level.
For more information about how to view information about volumes and increasing volume size, see
the Clustered Data ONTAP Logical Storage Management Guide.
For more information about how to view information about aggregates and managing aggregates, see
the Clustered Data ONTAP Physical Storage Management Guide.
Related information
ONTAP concepts
troubleshoot this issue, you need to determine whether any of the staging volumes used in the SVM
are full by displaying information about volume usage.
If the volume containing the consolidated event log files has sufficient space but there are still client
access failures due to insufficient space, then the staging volumes might be out of space. The SVM
administrator must contact you to determine whether the staging volumes that contain staging files
for the SVM have insufficient space. The auditing subsystem generates an EMS event if auditing
events cannot be generated due to insufficient space in a staging volume. The following message is
displayed: No space left on device. Only you can view information about staging volumes;
SVM administrators cannot.
All staging volume names begin with MDV_aud_ followed by the UUID of the aggregate containing
that staging volume. The following example shows four system volumes on the admin SVM, which
were automatically created when a file services auditing configuration was created for a data SVM in
the cluster:
If there is insufficient space in the staging volumes, you can resolve the space issues by increasing
the size of the volume.
Note: If the aggregate that contains the staging volume is full, then the size of the aggregate must
be increased before you can increase the size of the volume. Only you can increase the size of an
aggregate; SVM administrators cannot.
If one or more aggregates have an available space of less than 2 GB, the SVM audit creation fails.
When the SVM audit creation fails, the staging volumes that were created are deleted.
Related information
ONTAP concepts
46
Related concepts
Roles that cluster components play with FPolicy implementation on page 47
How FPolicy works with external FPolicy servers on page 48
How FPolicy services work across SVM namespaces on page 51
FPolicy configuration types on page 51
What the steps for setting up an FPolicy configuration are on page 55
when the Storage Virtual Machine (SVM) administrator wants to monitor and audit file
access activity.
Synchronous notifications
When configured to run in synchronous mode, the FPolicy server must acknowledge every
notification before the client operation is allowed to continue. This type of notification is
used when an action is required based on the results of notification evaluation. For
example, synchronous notifications are used when the SVM administrator wants to either
allow or deny requests based on criteria specified on the external FPolicy server.
Related concepts
How control channels are used for FPolicy communication on page 48
How privileged data access channels are used for synchronous communication on page 48
Synchronous applications are ones where data access is altered or data is modified by the external
FPolicy server. For example:
• Quota management
You can use the SDK for FPolicy to identify and implement other applications as well.
• Ensures that file notification flows through the correct LIF to the FPolicy server.
• Ensures that when multiple FPolicy servers are associated with a policy, load balancing is done
when sending notifications to the FPolicy servers.
• Manages the passthrough-read data connection established by the FPolicy server for servicing
client requests when passthrough-read is enabled.
How privileged data access channels are used for synchronous communication
With synchronous use cases, the FPolicy server accesses data residing on the Storage Virtual
Machine (SVM) through a privileged data access path. Access through the privileged path exposes
the complete file system to the FPolicy server. It can access data files to collect information, to scan
files, read files, or write into files.
Because the external FPolicy server can access the entire file system from the root of the SVM
through the privileged data channel, the privileged data channel connection must be secure.
Related concepts
What granting super user credentials for privileged data access means on page 49
How FPolicy connection credentials are used with privileged data access channels
The FPolicy server makes privileged data access connections to cluster nodes by using a specific
Windows user credential that is saved with the FPolicy configuration. SMB is the only supported
protocol for making a privileged data access channel connection.
If the FPolicy server requires privileged data access, the following conditions must be met:
• The FPolicy server must run under the credentials configured in the FPolicy configuration.
When making a data channel connection, FPolicy uses the credential for the specified Windows user
name. Data access is made over the admin share ONTAP_ADMIN$.
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 49
What granting super user credentials for privileged data access means
Data ONTAP uses the combination of the IP address and the user credential configured in the FPolicy
configuration to grant super user credentials to the FPolicy server.
Super user status grants the following privileges when the FPolicy server accesses data:
• When you want a policy to always be evaluated before other policies, configure that policy with a
higher priority.
• If the success of requested file access operation on a monitored event is a prerequisite for a file
request that is evaluated against another policy, give the policy that controls the success or failure
of the first file operation a higher priority.
For example, if one policy manages FPolicy file archiving and restore functionality and a second
policy manages file access operations on the online file, the policy that manages file restoration
must have a higher priority so that the file is restored before the operation managed by the second
policy can be allowed.
• If you want all policies that might apply to a file access operation to be evaluated, give
synchronous policies a lower priority.
You can reorder policy priorities for existing policies by modifying the policy sequence number.
However, to have FPolicy evaluate policies based on the modified priority order, you must disable
and reenable the policy with the modified sequence number.
Related concepts
Planning the FPolicy policy configuration on page 70
Each FPolicy process on participating nodes attempts to establish a connection with the FPolicy
server when the policy is enabled. It uses the IP address and port of the FPolicy external engine
specified in the policy configuration.
The connection establishes a control channel from each of the nodes participating on each SVM to
the FPolicy server through the data LIF. In addition, if IPv4 and IPv6 data LIF addresses are present
on the same participating node, FPolicy attempts to establish connections for both IPv4 and IPv6.
Therefore, in a scenario where the SVM extends over multiple nodes or if both IPv4 and IPv6
addresses are present, the FPolicy server must be ready for multiple control channel setup requests
from the cluster after the FPolicy policy is enabled on the SVM.
For example, if a cluster has three nodes—Node1, Node2, and Node3—and SVM data LIFs are
spread across only Node2 and Node3, control channels are initiated only from Node2 and Node3,
irrespective of the distribution of data volumes. Say that Node2 has two data LIFs—LIF1 and LIF2—
that belong to the SVM and that the initial connection is from LIF1. If LIF1 fails, FPolicy attempts to
establish a control channel from LIF2.
Node1 Node2 Node3
FPolicy Response
Client File response
FPolicy Response
Client File response
Node without
SVM data LIF
Nodes with SVM data LIFs
Note: The FPolicy server detects broken connections with the keep-alive protocol message. The
timeout for purging the session ID is determined when configuring FPolicy. The default keep-alive
timeout is two minutes.
• A single namespace exists in each SVM, with the root of the namespace being the root volume,
represented in the namespace as slash (/).
• All other volumes have junction points below the root (/).
• A single NFS export can provide access to the complete namespace; otherwise, export policies
can export specific volumes.
• SMB shares can be created on the volume or on qtrees within the volume, or on any directory
within the namespace.
Related concepts
Planning the FPolicy policy configuration on page 70
Creating the FPolicy configuration on page 78
How FPolicy passthrough-read enhances usability for hierarchical storage management on page
52
52 | SMB/CIFS and NFS Auditing and Security Tracing Guide
• The same set of filters and protocols that are supported by FPolicy server-based file screening are
also supported for native file blocking.
• Native file blocking and FPolicy server-based file screening applications can be configured at the
same time.
To do so, you can configure two separate FPolicy policies for the Storage Virtual Machine
(SVM), with one configured for native file blocking and one configured for FPolicy server-based
file screening.
• The native file blocking feature only screens files based on the extensions and not on the content
of the file.
• In the case of symbolic links, native file blocking uses the file extension of the root file.
latency to client requests caused by the need to recall the content before responding to the request
and the increased space consumption needed for recalled files on the primary storage.
FPolicy passthrough-read allows the HSM server (the FPolicy server) to provide read access to
migrated, offline files without having to recall the file from the secondary storage system to the
primary storage system. Instead of recalling the files back to primary storage, read requests can be
serviced directly from secondary storage.
Note: Copy Offload (ODX) is not supported with FPolicy passthrough-read operation.
• Better capacity and performance management when a surge of data recall might occur, such as if
a script or a backup solution needs to access many offline files.
• Policies can be set up that control when read requests are serviced through access to the file on
secondary storage and when the offline file should be recalled to primary storage.
For example, a policy can be created on the HSM server that specifies the number of times the
offline file can be accessed in a specified period of time before the file is migrated back to
primary storage. This type of policy avoids recalling files that are rarely accessed.
Related concepts
Passthrough-read upgrade and revert considerations on page 55
Related concepts
Passthrough-read upgrade and revert considerations on page 55
54 | SMB/CIFS and NFS Auditing and Security Tracing Guide
• All nodes in the cluster must be running a version of Data ONTAP that supports FPolicy.
• If you are not using the Data ONTAP native FPolicy engine, you must have external FPolicy
servers (FPolicy servers) installed.
• The FPolicy servers must be installed on a server accessible from the data LIFs of the SVM
where FPolicy policies are enabled.
• The IP address of the FPolicy server must be configured as a primary or secondary server in the
FPolicy policy external engine configuration.
• If the FPolicy servers access data over a privileged data channel, the following additional
requirements must be met:
◦ A user credential must be configured for accessing files over the privileged data channel.
◦ The FPolicy server must run under the credentials configured in the FPolicy configuration.
◦ All data LIFs used to communicate with the FPolicy servers must be configured to have cifs
as one of the allowed protocols.
This includes the LIFs used for passthrough-read connections.
Related concepts
Planning the FPolicy external engine configuration on page 57
How privileged data access channels are used for synchronous communication on page 48
How FPolicy connection credentials are used with privileged data access channels on page 48
What granting super user credentials for privileged data access means on page 49
• External FPolicy servers (FPolicy servers) should be placed in close proximity to the cluster with
high-bandwidth connectivity to provide minimal latency and high-bandwidth connectivity.
• The FPolicy external engine should be configured with more than one FPolicy server to provide
resiliency and high availability of FPolicy server notification processing, especially if policies are
configured for synchronous screening.
• It is recommended that you disable the FPolicy policy before making any configuration changes.
For example, if you want to add or modify an IP address in the FPolicy external engine
configured for the enabled policy, you should first disable the policy.
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 55
• The cluster node-to-FPolicy server ratio should be optimized to ensure that FPolicy servers are
not overloaded, which can introduce latencies when the SVM responds to client requests.
The optimal ratio depends on the application for which the FPolicy server is being used.
Related concepts
Planning the FPolicy external engine configuration on page 57
Related tasks
Enabling or disabling FPolicy policies on page 84
Upgrading
After all nodes are upgraded to a version of ONTAP that supports FPolicy passthrough-read, the
cluster is capable of using the passthrough-read functionality; however, passthrough-read is disabled
by default on existing FPolicy configurations. To use passthrough-read on existing FPolicy
configurations, you must disable the FPolicy policy and modify the configuration, and then reenable
the configuration.
Reverting
Before reverting to a version of ONTAP that does not support FPolicy passthrough-read, the
following conditions must be met:
• All the policies using passthrough-read must be disabled, and then the affected configurations
must be modified so that they do not use passthrough-read.
• FPolicy functionality must be disabled on the cluster by disabling every FPolicy policy on the
cluster.
policy also defines whether the FPolicy server is allowed privileged access to the data for which it
receives notifications. An FPolicy server needs privileged access if the server needs to access the
data. Typical use cases where privileged access is needed include file blocking, quota
management, and hierarchical storage management. The policy is where you specify whether the
configuration for this policy uses an FPolicy server or the internal “native” FPolicy server.
A policy specifies whether screening is mandatory. If screening is mandatory and all FPolicy
servers are down or no response is received from the FPolicy servers within a defined timeout
period, then file access is denied.
A policy's boundaries are the SVM. A policy cannot apply to more than one SVM. However, a
specific SVM can have multiple FPolicy policies, each with the same or different combination of
scope, event, and external server configurations.
Note: If the policy uses native file blocking, an external engine is not configured or associated with
the policy.
Related concepts
Planning the FPolicy configuration on page 56
Creating the FPolicy configuration on page 78
FPolicy is supported on Storage Virtual Machines (SVMs) with FlexVol volumes. FPolicy is not
supported on SVMs with Infinite Volume.
Related concepts
What the steps for setting up an FPolicy configuration are on page 55
Creating the FPolicy configuration on page 78
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 57
• Engine name
• The IP addresses of the primary and secondary FPolicy servers and the TCP port number to use
when making the connection to the FPolicy servers
• How to authenticate the connection between the node and the FPolicy server
If you choose to configure mutual SSL authentication, then you must also configure parameters
that provide SSL certificate information.
• How to manage the connection using various advanced privilege settings
This includes parameters that define such things as timeout values, retry values, keep-alive values,
maximum request values, sent and receive buffer size values, and session timeout values.
• a through z
• A through Z
• 0 through 9
Related concepts
Additional information about configuring FPolicy external engines to use SSL authenticated
connections on page 62
Restrictions for cluster-scoped FPolicy external engines with MetroCluster and SVM disaster
recovery configurations on page 63
Related information
ONTAP concepts
62 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Mutual authentication
If you configure FPolicy external engines to use SSL mutual authentication when connecting Storage
Virtual Machine (SVM) data LIFs to external FPolicy servers, before creating the external engine,
you must install the public certificate of the CA that signed the FPolicy server certificate along with
the public certificate and key file for authentication of the SVM. You must not delete this certificate
while any FPolicy policies are using the installed certificate.
If the certificate is deleted while FPolicy is using it for mutual authentication when connecting to an
external FPolicy server, you cannot reenable a disabled FPolicy policy that uses that certificate. The
FPolicy policy cannot be reenabled in this situation even if a new certificate with the same settings is
created and installed on the SVM.
If the certificate has been deleted, you need to install a new certificate, create new FPolicy external
engines that use the new certificate, and associate the new external engines with the FPolicy policy
that you want to reenable by modifying the FPolicy policy.
Related concepts
Planning the FPolicy external engine configuration on page 57
Restrictions for cluster-scoped FPolicy external engines with MetroCluster and SVM
disaster recovery configurations
You can create a cluster-scoped FPolicy external engine by assigning the cluster Storage Virtual
Machine (SVM) to the external engine. However, when creating a cluster-scoped external engine in a
MetroCluster or SVM disaster recovery configuration, there are certain restrictions when choosing
the authentication method that the SVM uses for external communication with the FPolicy server.
There are three authentication options that you can choose when creating external FPolicy servers: no
authentication, SSL server authentication, and SSL mutual authentication. Although there are no
restrictions when choosing the authentication option if the external FPolicy server is assigned to a
data SVM, there are restrictions when creating a cluster-scoped FPolicy external engine:
Configuration Permitted?
MetroCluster or SVM disaster recovery and a Yes
cluster-scoped FPolicy external engine with no
authentication (SSL is not configured)
MetroCluster or SVM disaster recovery and a No
cluster-scoped FPolicy external engine with SSL
server or SSL mutual authentication
• If a cluster-scoped FPolicy external engine with SSL authentication exists and you want to create
a MetroCluster or SVM disaster recovery configuration, you must modify this external engine to
use no authentication or remove the external engine before you can create the MetroCluster or
SVM disaster recovery configuration.
• If the MetroCluster or SVM disaster recovery configuration already exists, clustered Data
ONTAP prevents you from creating a cluster-scoped FPolicy external engine with SSL
authentication.
Related concepts
Planning the FPolicy external engine configuration on page 57
• Event name
• A through Z
• 0 through 9
• cifs
• nfsv3
• nfsv4
Note: If you specify -protocol, then you must specify a valid value
in the -file-operations parameter. As the protocol version
changes, the valid values might change.
• offline-bit option to filter the client request for offline bit set.
Setting this filter results in the FPolicy server receiving notification
only when offline files are accessed.
List of supported file operation and filter combinations that FPolicy can monitor for SMB
When you configure your FPolicy event, you need to be aware that only certain combinations of file
operations and filters are supported for monitoring SMB file access operations.
The list of supported file operation and filter combinations for FPolicy monitoring of SMB file access
events is provided in the following table:
Supported file operation and filter combinations that FPolicy can monitor for NFSv3
When you configure your FPolicy event, you need to be aware that only certain combinations of file
operations and filters are supported for monitoring NFSv3 file access operations.
The list of supported file operation and filter combinations for FPolicy monitoring of NFSv3 file
access events is provided in the following table:
Supported file operation and filter combinations that FPolicy can monitor for NFSv4
When you configure your FPolicy event, you need to be aware that only certain combinations of file
operations and filters are supported for monitoring NFSv4 file access operations.
The list of supported file operation and filter combinations for FPolicy monitoring of NFSv4 file
access events is provided in the following table:
• A through Z
• 0 through 9
• If -allow-privileged-access is set
to no, any value set for this parameter is
ignored.
74 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Related concepts
How FPolicy manages policy processing on page 49
Requirements, considerations, and best practices for configuring FPolicy on page 53
How FPolicy passthrough-read enhances usability for hierarchical storage management on page 52
Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine on page
74
Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine
If you configure the FPolicy policy to use the native engine, there is a specific requirement for how
you define the FPolicy scope configured for the policy.
The FPolicy scope defines the boundaries on which the FPolicy policy applies, for example whether
the FPolicy applies to specified volumes or shares. There are a number of parameters that further
restrict the scope to which the FPolicy policy applies. One of these parameters, -is-file-
extension-check-on-directories-enabled, specifies whether to check file extensions on
directories. The default value is false, which means that file extensions on directories are not
checked.
When an FPolicy policy that uses the native engine is enabled on a share or volume and the -is-
file-extension-check-on-directories-enabled parameter is set to false for the scope of
the policy, directory access is denied. With this configuration, because the file extensions are not
checked for directories, any directory operation is denied if it falls under the scope of the policy.
To ensure that directory access succeeds when using the native engine, you must set the -is-file-
extension-check-on-directories-enabled parameter to true when creating the scope.
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 75
With this parameter set to true, extension checks happen for directory operations and the decision
whether to allow or deny access is taken based on the extensions included or excluded in the FPolicy
scope configuration.
Related concepts
FPolicy configuration types on page 51
When to create a native FPolicy configuration on page 52
Planning the FPolicy scope configuration on page 75
• SVM name
• Policy name
Note: There are special considerations for the scope for a cluster FPolicy policy. The cluster
FPolicy policy is a policy that the cluster administrator creates for the admin SVM. If the cluster
administrator also creates the scope for that cluster FPolicy policy, the SVM administrator cannot
create a scope for that same policy. However, if the cluster administrator does not create a scope
for the cluster FPolicy policy, then any SVM administrator can create the scope for that cluster
policy. If the SVM administrator creates a scope for that cluster FPolicy policy, the cluster
administrator cannot subsequently create a cluster scope for that same cluster policy. This is
because the cluster administrator cannot override the scope for the same cluster policy.
• When a share is included in the -shares-to-include parameter and the parent volume of the
share is included in the -volumes-to-exclude parameter, -volumes-to-exclude has
precedence over -shares-to-include.
Related concepts
Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine on page
74
Steps
1. Creating the FPolicy external engine on page 79
You must create an external engine to start creating an FPolicy configuration. The external engine
defines how FPolicy makes and manages connections to external FPolicy servers. If your
configuration uses the internal ONTAP engine (the native external engine) for simple file
blocking, you do not need to configure a separate FPolicy external engine and do not need to
perform this step.
2. Creating the FPolicy event on page 80
As part of creating an FPolicy policy configuration, you need to create an FPolicy event. You
associate the event with the FPolicy policy when it is created. An event defines which protocol to
monitor and which file access events to monitor and filter.
3. Creating the FPolicy policy on page 80
When you create the FPolicy policy, you associate an external engine and one or more events to
the policy. The policy also specifies whether mandatory screening is required, whether the FPolicy
servers have privileged access to data on the Storage Virtual Machine (SVM), and whether
passthrough-read for offline files is enabled.
4. Creating the FPolicy scope on page 82
After creating the FPolicy policy, you need to create an FPolicy scope. When creating the scope,
you associate the scope with an FPolicy policy. A scope defines the boundaries on which the
FPolicy policy applies. Scopes can include or exclude files based on shares, export policies,
volumes, and file extensions.
5. Enabling the FPolicy policy on page 82
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 79
After you are through configuring an FPolicy policy configuration, you enable the FPolicy policy.
Enabling the policy sets its priority and starts file access monitoring for the policy.
Related concepts
What the steps for setting up an FPolicy configuration are on page 55
Planning the FPolicy configuration on page 56
Requirements, considerations, and best practices for configuring FPolicy on page 53
Displaying information about FPolicy configurations on page 84
How FPolicy passthrough-read enhances usability for hierarchical storage management on page 52
Steps
1. Create the FPolicy external engine by using the vserver fpolicy policy external-
engine create command.
Example
The following command creates an external engine on Storage Virtual Machine (SVM)
vs1.example.com. No authentication is required for external communications with the FPolicy
server.
vserver fpolicy policy external-engine create -vserver-name
vs1.example.com -engine-name engine1 -primary-servers 10.1.1.2,10.1.1.3
-port 6789 -ssl-option no-auth
2. Verify the FPolicy external engine configuration by using the vserver fpolicy policy
external-engine show command.
Example
The following command display information about all external engines configured on SVM
vs1.example.com:
vserver fpolicy policy external-engine show -vserver vs1.example.com
The following command displays detailed information about the external engine named
“engine1” on SVM vs1.example.com:
vserver fpolicy policy external-engine show -vserver vs1.example.com -
engine-name engine1
Vserver: vs1.example.com
Engine: engine1
Primary FPolicy Servers: 10.1.1.2, 10.1.1.3
Port Number of FPolicy Service: 6789
Secondary FPolicy Servers: -
External Engine Type: synchronous
SSL Option for External Communication: no-auth
FQDN or Custom Common Name: -
Serial Number of Certificate: -
Certificate Authority: -
Steps
1. Create the FPolicy event by using the vserver fpolicy policy event create command.
Example
vserver fpolicy policy event create -vserver-name vs1.example.com -
event-name event1 -protocol cifs -file-operations open,close,read,write
2. Verify the FPolicy event configuration by using the vserver fpolicy policy event show
command.
Example
vserver fpolicy policy event show -vserver vs1.example.com
• If you plan on configuring the policy to use FPolicy servers, the external engine must exist.
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 81
• At least one FPolicy event that you plan on associating with the FPolicy policy must exist.
• If you want to configure privileged data access, a CIFS server must exist on the SVM.
Steps
Example
The following command creates a policy named “policy1” that has the event named “event1” and
the external engine named “engine1” associated with it. This policy uses default values in the
policy configuration:
vserver fpolicy policy create -vserver vs1.example.com -policy-name
policy1 -events event1 -engine engine1
The following command creates a policy named “policy2” that has the event named “event2” and
the external engine named “engine2” associated with it. This policy is configured to use
privileged access using the specified user name. Passthrough-read is enabled:
vserver fpolicy policy create -vserver vs1.example.com -policy-name
policy2 -events event2 -engine engine2 -allow-privileged-access yes
‑privileged-user-name example\archive_acct -is-passthrough-read-enabled
true
The following command creates a policy named “native1” that has the event named “event3”
associated with it. This policy uses the native engine and uses default values in the policy
configuration:
vserver fpolicy policy create -vserver vs1.example.com -policy-name
native1 -events event3 -engine native
2. Verify the FPolicy policy configuration by using the vserver fpolicy policy show
command.
Example
The following command displays information about the three configured FPolicy policies,
including the following information:
Steps
1. Create the FPolicy scope by using the vserver fpolicy policy scope create command.
Example
vserver fpolicy policy scope create -vserver-name vs1.example.com -
policy-name policy1 -volumes-to-include datavol1,datavol2
2. Verify the FPolicy scope configuration by using the vserver fpolicy policy scope show
command.
Example
vserver fpolicy policy scope show -vserver vs1.example.com -instance
Vserver: vs1.example.com
Policy: policy1
Shares to Include: -
Shares to Exclude: -
Volumes to Include: datavol1, datavol2
Volumes to Exclude: -
Export Policies to Include: -
Export Policies to Exclude: -
File Extensions to Include: -
File Extensions to Exclude: -
Steps
1. Enable the FPolicy policy by using the vserver fpolicy enable command.
Example
vserver fpolicy enable -vserver-name vs1.example.com -policy-name
policy1 -sequence-number 1
2. Verify that the FPolicy policy is enabled by using the vserver fpolicy show command.
Example
vserver fpolicy show -vserver vs1.example.com
Sequence
Vserver Policy Name Number Status Engine
--------------- ----------------- -------- -------- ---------
vs1.example.com policy1 1 on engine1
Related concepts
Creating the FPolicy configuration on page 78
Managing FPolicy server connections on page 87
See the man pages for the commands for more information.
84 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Related references
Commands for displaying information about FPolicy configurations on page 85
• The priority is used when multiple policies are enabled on the Storage Virtual Machine (SVM)
and more than one policy has subscribed to the same file access event.
• Policies that use the native engine configuration have a higher priority than policies for any other
engine, regardless of the sequence number assigned to them when enabling the policy.
• If you want to change the priority of an FPolicy policy, you must disable the policy and then
reenable it using the new sequence number.
Step
Related tasks
Displaying information about FPolicy policy status on page 85
Displaying information about enabled FPolicy policies on page 86
Related concepts
Creating the FPolicy configuration on page 78
Modifying FPolicy configurations on page 83
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 85
When you use the -instance parameter with a show command, the command output displays
detailed information in a list format. In some cases, the detailed output can be lengthy and include
more information than you need. You can use the -fields fieldname[,fieldname...]
parameter to customize the output so that it displays information only for the fields you specify. You
can identity which fields that you can specify by entering ? after the -fields parameter.
Note: The output of a show command with the -fields parameter might display other relevant
and necessary fields related to the requested fields.
Every show command has one or more optional parameters that filter that output and enable you to
narrow the scope of information displayed in command output. You can identity which optional
parameters are available for a command by entering ? after the show command.
The show command supports UNIX-style patterns and wildcards to enable you to match multiple
values in command-parameters arguments. For example, you can use the wildcard operator (*), the
NOT operator (!), the OR operator (|), the range operator (integer...integer), the less-than operator (<),
the greater-than operator (>), the less-than or equal to operator (<=), and the greater-than or equal to
operator (>=) when specifying values.
For more information about using UNIX-style patterns and wildcards, see the “Using the Data
ONTAP command-line interface” section of the Clustered Data ONTAP System Administration
Guide for SVM Administrators.
See the man pages for the commands for more information.
• SVM name
86 | SMB/CIFS and NFS Auditing and Security Tracing Guide
• Policy name
• Policy status
In addition to displaying information about policy status for FPolicy policies configured on the
cluster or a specific SVM, you can use command parameters to filter the command's output by other
criteria.
You can specify the -instance parameter to display detailed information about listed policies.
Alternatively, you can use the -fields parameter to display only the indicated fields in the
command output, or -fields ? to determine what fields you can use.
Step
1. Display filtered information about FPolicy policy status by using the appropriate command:
That have the specified status vserver fpolicy show -status {on|off}
The following example displays the information about FPolicy policies on the cluster:
• SVM name
• Policy name
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 87
• Policy priority
You can use command parameters to filter the command's output by specified criteria.
Step
1. Display information about enabled FPolicy policies by using the appropriate command:
The following example displays the information about enabled FPolicy policies on the cluster:
Related concepts
What the two parts of the FPolicy solution are on page 46
What synchronous and asynchronous notifications are on page 46
How FPolicy works with external FPolicy servers on page 48
What the node-to-external FPolicy server communication process is on page 49
Steps
1. Connect to the external FPolicy server by using the vserver fpolicy engine-connect
command.
For more information about the command, see the man pages.
2. Verify that the external FPolicy server is connected by using the vserver fpolicy show-
engine command.
For more information about the command, see the man pages.
Steps
1. Disconnect from the external FPolicy server by using the vserver fpolicy engine-
disconnect command.
For more information about the command, see the man pages.
2. Verify that the external FPolicy server is disconnected by using the vserver fpolicy show-
engine command.
For more information about the command, see the man pages.
• SVM name
• Node name
In addition to displaying information about FPolicy connections on the cluster or a specific SVM,
you can use command parameters to filter the command's output by other criteria.
You can specify the -instance parameter to display detailed information about listed policies.
Alternatively, you can use the -fields parameter to display only the indicated fields in the
command output. You can enter ? after the -fields parameter to find out which fields you can use.
Step
1. Display filtered information about connection status between the node and the FPolicy server by
using the appropriate command:
Using FPolicy for file monitoring and management on SVMs with FlexVol volumes | 89
With the server status that vserver fpolicy show-engine -server-status status
you specify
The server status can be one of the following:
• connected
• disconnected
• connecting
• disconnecting
• primary
• secondary
This example displays information about external engine connections to FPolicy servers on
SVM vs1.example.com:
Related concepts
How FPolicy works with external FPolicy servers on page 48
What the node-to-external FPolicy server communication process is on page 49
Related tasks
Displaying information about the FPolicy passthrough-read connection status on page 90
• SVM name
• Node name
In addition to displaying information about FPolicy connections on the cluster or a specific SVM,
you can use command parameters to filter the command's output by other criteria.
You can specify the -instance parameter to display detailed information about listed policies.
Alternatively, you can use the -fields parameter to display only the indicated fields in the
command output. You can enter ? after the -fields parameter to find out which fields you can use.
Step
1. Display filtered information about connection status between the node and the FPolicy server by
using the appropriate command:
• connected
• disconnected
The following command displays information about passthrough-read connections from all
FPolicy servers on the cluster:
Node: FPolicy-01
Vserver: vs1.example.com
Policy: pol_cifs_1
Server: 1.1.1.1
Session ID of the Control Channel: 8cef052e-2502-11e3-88d4-123478563412
Server Status: connected
Time Passthrough Read Channel was Connected: 9/24/2013 10:17:45
Time Passthrough Read Channel was Disconnected: -
Reason for Passthrough Read Channel Disconnection: none
Related concepts
How FPolicy works with external FPolicy servers on page 48
How FPolicy passthrough-read enhances usability for hierarchical storage management on page 52
Related tasks
Displaying information about connections to external FPolicy servers on page 88
92
• Each incoming request is screened to see if it matches filtering criteria of any enabled security
traces.
• Traces are performed for both file and folder access requests.
◦ Client IP
◦ Windows name
◦ UNIX name
• Requests are screened for Allowed and Denied access response results.
• Each request matching filtering criteria of enabled traces is recorded in the trace results log.
• The storage administrator can configure a timeout on a filter to automatically disable it.
• If a request matches multiple filters, the results from the filter with the highest index number is
recorded.
• The storage administrator can print results from the trace results log to determine why an access
request was allowed or denied.
• Effective security of the file system containing the files and folders on which operations are
requested
• User mapping
• Share-level permissions
• Export-level permissions
• File-level permissions
• Storage-Level Access Guard security
• You can only create security traces on SVMs with FlexVol volumes.
• You can add permission tracing filters for SMB and NFS requests.
• You must set up the CIFS or NFS server on the SVM on which you want to create trace filters.
• You can create security traces for files and folders residing on NTFS, UNIX, and mixed security-
style volumes and qtrees.
• You must specify a filter index number when creating or modifying a filter.
Filters are considered in order of the index number. The criteria in a filter with a higher index
number is considered before the criteria with a lower index number. If the request being traced
matches criteria in multiple enabled filters, only the filter with the highest index number is
triggered.
• After you have created and enabled a security trace filter, you must perform some file or folder
requests on a client system to generate activity that the trace filter can capture and log in the trace
results log.
• You should add permission tracing filters for file access verification or troubleshooting purposes
only.
Adding permission tracing filters has a minor effect on controller performance.
When you are done with verification or troubleshooting activity, you should disable or remove all
permission tracing filters. Furthermore, the filtering criteria you select should be as specific as
possible so that ONTAP does not send a large number of trace results to the log.
94 | SMB/CIFS and NFS Auditing and Security Tracing Guide
Steps
1. Creating security trace filters on page 94
You can create security trace filters that detect SMB/CIFS and NFS client operations on Storage
Virtual Machines (SVMs) with FlexVol volumes and trace all access checks matching the filter.
You can use the results from security traces to validate your configuration or to troubleshoot
access issues.
2. Displaying information about security trace filters on page 96
You can display information about security trace filters configured on your Storage Virtual
Machine (SVM). This enables you to see which types of access events each filter traces.
3. Displaying security trace results on page 97
You can display the security trace results generated for file operations that match security trace
filters. You can use the results to validate your file access security configuration or to troubleshoot
SMB and NFS file access issues.
4. Modifying security trace filters on page 98
If you want to change the optional filter parameters used to determine which access events are
traced, you can modify existing security trace filters.
5. Deleting security trace filters on page 99
When you no longer need a security trace filter entry, you can delete it. Because you can have a
maximum of 10 security trace filters per Storage Virtual Machine (SVM), deleting unneeded
filters enables you to create new filters if you have reached the maximum.
6. Deleting security trace records on page 100
After you finish using a filter trace record to verify file access security or to troubleshoot SMB or
NFS client access issues, you can delete the security trace record from the security trace log.
7. Deleting all security trace records on page 100
If you do not want to keep any of the existing security trace records, you can delete all of the
records on a node with a single command.
Required Description
parameters
-vserver SVM name
vserver_name The name of the SVM that contains the files or folders on which you want
to apply the security trace filter.
-index Filter index number
index_number The index number you want to apply to the filter. You are limited to a
maximum of 10 trace filters per SVM. The allowed values for this
parameter are 1 through 10.
A number of optional filter parameters enable you to customize the security trace filter so that you
can narrow down the results produced by the security trace:
• The complete path, starting from the root of the share or export
You must use NFS style directory UNIX-style directory separators in the
path value.
-windows-name You can specify either the Windows user name or UNIX user name whose
win_user_name or - access requests you want to trace. The user name variable is case
unix-name insensitive. You cannot specify both a Windows user name and a UNIX
unix_user_name user name in the same filter.
Note: Even though you can trace SMB/CIFS and NFS access events,
the mapped UNIX user and the mapped UNIX users' groups might be
used when performing access checks on mixed or UNIX security-style
data.
-trace-allow Tracing for deny events is always enabled for a security trace filter. You
{yes|no} can optionally trace allow events. To trace allow events, you set this
parameter to yes.
-enabled You can enable or disable the security trace filter. By default, the security
{enabled| trace filter is enabled.
disabled}
-time-enabled You can specify a timeout for the filter, after which it is disabled.
integer
Steps
Example
For more information, see the man pages for the command.
Examples
The following command creates a security trace filter for any user accessing a file with a share
path \\server\share1\dir1\dir2\file.txt from the IP address 10.10.10.7. The filter
uses a complete path for the -path option. The client's IP address used to access data is
10.10.10.7. The filter times out after 30 minutes:
cluster1::> vserver security trace filter create -vserver vs1 -index 1 -path /dir1/dir2/
file.txt -time-enabled 30 -client-ip 10.10.10.7
cluster1::> vserver security trace filter show -index 1
Vserver Index Client-IP Path Trace-Allow Windows-Name
-------- ----- ----------- ---------------------- ----------- -------------
vs1 1 10.10.10.7 /dir1/dir2/file.txt no -
The following command creates a security trace filter using a relative path for the -path
option. The filter traces access for a Windows user named “joe”. Joe is accessing a file with a
share path \\server\share1\dir1\dir2\file.txt. The filter traces allow and deny
events:
cluster1::> vserver security trace filter create -vserver vs1 -index 2 -path /dir1/dir2/
file.txt -trace-allow yes -windows-name mydomain\joe
Step
1. Display information about security trace filter entries by using the vserver security trace
filter show command.
For more information about using this command, see the man pages.
Examples
The following command displays information about all security trace filters on SVM vs1:
• Node name
• Path
• Reason
• User name
The user name displayed depends on how the trace filter is configured:
You can customize the output by using optional parameters. Some of the optional parameters that you
can use to narrow the results returned in the command output include the following:
-index integer Displays information about the events that occurred as a result of the filter
corresponding to the specified index number.
98 | SMB/CIFS and NFS Auditing and Security Tracing Guide
See the man page for information about other optional parameters that you can use with the
command.
Step
1. Display security trace filter results by using the vserver security trace trace-result
show command.
Example
vserver security trace trace-result show -user-name domain\user
Vserver: vs1
Steps
• vserver_name is the name of the SVM on which you want to apply a security trace filter.
• index_number is the index number that you want to apply to the filter. The allowed values
for this parameter are 1 through 10.
Example
The following command modifies the security trace filter with the index number 1. The filter
traces events for any user accessing a file with a share path \\server
\share1\dir1\dir2\file.txt from any IP address. The filter uses a complete path for the
-path option. The filter traces allow and deny events:
cluster1::> vserver security trace filter modify -vserver vs1 -index 1 -path /dir1/dir2/
file.txt -trace-allow yes
Steps
1. Identify the filter index number of the security trace filter entry you want to delete:
vserver security trace filter show -vserver vserver_name
Example
vserver security trace filter show -vserver vs1
2. Using the filter index number information from the previous step, delete the filter entry:
vserver security trace filter delete -vserver vserver_name -index
index_number
Example
vserver security trace filter delete -vserver vs1 -index 1
Example
vserver security trace filter show -vserver vs1
Steps
Example
vserver security trace trace-result delete -vserver vs1 -node node1 -
seqnum 999
• -node node_name is the name of the cluster node on which the permission tracing event that
you want to delete occurred.
This is a required parameter.
• -vserver vserver_name is the name of the SVM on which the permission tracing event
that you want to delete occurred.
This is a required parameter.
• -seqnum integer is the sequence number of the log event that you want to delete.
This is a required parameter.
Step
• -node node_name is the name of the cluster node on which the permission tracing event that
you want to delete occurred.
• -vserver vserver_name is the name of the Storage Virtual Machine (SVM) on which the
permission tracing event that you want to delete occurred.
Finding information about the lists of result types and filter details
You can find the lists of result types and filter details that can be included in the security trace results
in the man pages for the vserver security trace trace-result show command.
CIFS/SMB configuration
You can further configure CIFS access using the following comprehensive guides and technical
reports:
• CIFS management
Describes how to configure and manage file access using the CIFS/SMB protocol.
• NetApp Technical Report 4191: Best Practices Guide for Clustered Data ONTAP 8.2 Windows
File Services
Provides a brief overview of SMB implementation and other Windows File Services features with
recommendations and basic troubleshooting information for ONTAP.
• NetApp Technical Report 3740: SMB 2: Next-Generation CIFS Protocol in Data ONTAP
Describes SMB 2 features, configuration details, and its implementation in ONTAP.
• NetApp KB Article 4550: Clustered Data ONTAP CIFS Expert Recommended articles
Lists all common CIFS/SMB protocol operational and troubleshooting workflows
NFS configuration
You can further configure NFS access using the following comprehensive guides and technical
reports:
• NFS management
Describes how to configure and manage file access using the NFS protocol.
• NetApp Technical Report 4067: Clustered Data ONTAP Best Practice and NFS Implementation
Guide
Serves as an NFSv3 and NFSv4 operational guide and provides an overview of ONTAP operating
system with a focus on NFSv4.
• NetApp Technical Report 4379: Name Services Best Practice Guide Clustered Data ONTAP
Explains how to configure LDAP, NIS, DNS, and local file configuration for authentication
purposes.
• NetApp Technical Report 4073: Secure Unified Authentication with NetApp Storage Systems:
Kerberos, NFSv4, and LDAP for User Authentication over NFS (with a Focus on Clustered Data
ONTAP)
Explains how to configure ONTAP for use with UNIX-based Kerberos version 5 (krb5) servers
for NFS storage authentication and Windows Server Active Directory (AD) as the KDC and
Lightweight Directory Access Protocol (LDAP) identity provider.
• NetApp Technical Report 3580: NFSv4 Enhancements and Best Practices Guide: Data ONTAP
Implementation
Describes the best practices that should be followed while implementing NFSv4 components on
AIX, Linux, or Solaris clients attached to systems running ONTAP.
Where to find additional information | 103
Copyright information
Copyright © 1994–2017 NetApp, Inc. All rights reserved. Printed in the U.S.
No part of this document covered by copyright may be reproduced in any form or by any means—
graphic, electronic, or mechanical, including photocopying, recording, taping, or storage in an
electronic retrieval system—without prior written permission of the copyright owner.
Software derived from copyrighted NetApp material is subject to the following license and
disclaimer:
THIS SOFTWARE IS PROVIDED BY NETAPP "AS IS" AND WITHOUT ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE,
WHICH ARE HEREBY DISCLAIMED. IN NO EVENT SHALL NETAPP BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
NetApp reserves the right to change any products described herein at any time, and without notice.
NetApp assumes no responsibility or liability arising from the use of products described herein,
except as expressly agreed to in writing by NetApp. The use or purchase of this product does not
convey a license under any patent rights, trademark rights, or any other intellectual property rights of
NetApp.
The product described in this manual may be protected by one or more U.S. patents, foreign patents,
or pending applications.
RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to
restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer
Software clause at DFARS 252.277-7103 (October 1988) and FAR 52-227-19 (June 1987).
105
Trademark information
Active IQ, AltaVault, Arch Design, ASUP, AutoSupport, Campaign Express, Clustered Data ONTAP,
Customer Fitness, Data ONTAP, DataMotion, Element, Fitness, Flash Accel, Flash Cache, Flash
Pool, FlexArray, FlexCache, FlexClone, FlexPod, FlexScale, FlexShare, FlexVol, FPolicy, Fueled by
SolidFire, GetSuccessful, Helix Design, LockVault, Manage ONTAP, MetroCluster, MultiStore,
NetApp, NetApp Insight, OnCommand, ONTAP, ONTAPI, RAID DP, RAID-TEC, SANscreen,
SANshare, SANtricity, SecureShare, Simplicity, Simulate ONTAP, Snap Creator, SnapCenter,
SnapCopy, SnapDrive, SnapIntegrator, SnapLock, SnapManager, SnapMirror, SnapMover,
SnapProtect, SnapRestore, Snapshot, SnapValidator, SnapVault, SolidFire, SolidFire Helix,
StorageGRID, SyncMirror, Tech OnTap, Unbound Cloud, and WAFL and other names are
trademarks or registered trademarks of NetApp, Inc., in the United States, and/or other countries. All
other brands or products are trademarks or registered trademarks of their respective holders and
should be treated as such. A current list of NetApp trademarks is available on the web.
http://www.netapp.com/us/legal/netapptmlist.aspx
106
Index
A event log consolidation 9
event log consolidation when a node is unavailable 9
about this guide event log rotation 9
deciding whether to use the SMB/CIFS and NFS how active audit logs are viewed using Event Viewer
Auditing Guide 6 13
access how staging volumes are created on aggregates 11
additional documentation 102 how the ONTAP process works 9
access checks how to troubleshoot event log volume space issues
security trace, types monitored 92 44
aggregates how to troubleshoot staging volume space issues 44
space considerations when staging volumes are introduction to NFS and SMB file and folder access
created by enabled auditing subsystem 11 8
alternate data streams list of NFS events 18
considerations when auditing files with NTFS 17 manually converting the audit event logs 40
asynchronous partial event log consolidation 9
FPolicy applications 47 planning the configuration on SVMs with FlexVol
FPolicy notifications, defined 46 volumes 19
audience process when enabling or disabling 9
for the guide 6 requirements and considerations for configuring 11
audit event logs revert process when there are audit-enabled SVMs
manually rotating 40 43
audit policies SMB events that can be audited 13
configuring using the Windows Security tab 26 staging files, staging volumes, consolidation tasks,
displaying using the Windows Security tab 30 conversion tasks, defined 8
introduction to configuring file and folder 26 supported audit event log formats 12
NTFS, how to configure using the ONTAP CLI 29 verifying configuration 25
using the ONTAP CLI to display information about verifying that it is enabled 41
NTFS 31 viewing audit event logs 12
audit policy auditing, file access
wildcard character (*) to display information about requirements for using SMB/CIFS and NFS auditing
33 guide to understand, plan, and implement 6
audit policy events auditing, Fpolicy
CLI change that can be audited 34 requirements for using SMB/CIFS and NFS auditing
audit-enabled SVMs guide to understand, plan, and implement 6
actions you must take before revert 43 auditing, ONTAP native
audit-policy change events requirements for using SMB/CIFS and NFS auditing
generated when an audit policy is modified 37 guide to understand, plan, and implement 6
auditing authentication
actions you must take on audit-enabled SVMs before additional information when using FPolicy external
revert 43 engine connections with SSL 62
actions you must take prior to revert 43 authorization policy events
aggregate space considerations when enabling 11 CLI change that can be audited 34
CLI change events that can be audited 34 authorization-policy-change events
commands for modifying configuration 42 generated when the authorization rights are granted
configuring for NFS 29 or revoked 39
considerations for files with NTFS alternate data
streams 17
considerations for symlinks and hard links 16 B
creating configuration for file and directory events best practices
23 FPolicy setup 54
creating file and directory, configuration 23
deleting configuration 43
determining what the complete path to the audited C
object is 15
central access policy staging events
displaying information about configuration 41
SMB, that can be audited 13
displaying information about NTFS audit policies
certain local security group events
using the ONTAP CLI 31
CLI change that can be audited 34
enabling and disabling on SVMs 40
certain local user group events
enabling on the SVM 25
108 | SMB/CIFS and NFS Auditing and Security Tracing Guide
CLI change that can be audited 34 how control channels are used with FPolicy
CIFS communication 48
additional documentation 102 how FPolicy handle migrations and failovers for 50
cifs share events role with FPolicy implementations 47
CLI change that can be audited 34 data streams
client access failures considerations when auditing files with NTFS
how to troubleshoot staging volume space issues that alternate 17
result in 44 definitions
CLIs FPolicy 46
change events that can be audited 34 deleting
clusters all security trace records 100
role with FPolicy implementations 47 audit configuration 43
commands security trace filters 99
for modifying SVM auditing configurations 42 security trace records 100
comments directories
how to send feedback about documentation 106 configuring NTFS audit policies using the Windows
configuration types Security tab on 26
FPolicy, defined 51 directory events
configurations, auditing creating auditing configuration for 23
planning on SVMs with FlexVol volumes 19 disabling
configuring auditing on SVMs 40
audit policies using the Windows Security tab 26 FPolicy policies 84
auditing for file and directory events 23 disaster recovery
auditing for NFS 29 security certificates for FPolicy do not replicate in
FPolicy 78 SVM non-ID-preserve configurations 62
connecting disconnecting
to external FPolicy servers 87 from external FPolicy servers 88
connection credentials displaying
FPolicy, how used with privileged data access audit policy information using the Windows Security
channels 48 tab 30
connections files and directories, audit policies 31
additional information when using SSL FPolicy configuration information, commands for 85
authentication for FPolicy external engine 62 FPolicy configuration, how show commands work
considerations when 85
aggregate space, for staging volumes when enabling information about auditing configurations 41
auditing 11 information about connections to external FPolicy
auditing configuration 11 servers 88
when creating security traces 93 information about enabled FPolicy policies 86
consolidation tasks information about FPolicy configurations 84
defined for auditing 8 information about FPolicy passthrough-read
control channels connection status 90
how FPolicy uses 48 information about FPolicy policy status 85
conversion tasks NTFS auditing information on FlexVol volumes
defined for auditing 8 using the ONTAP CLI 31
creating security trace filters 96
auditing configuration for file and directory events security trace results 97
23 documentation
file and directory auditing configuration 23 additional information about protocol access 102
FPolicy configurations 78 how to receive automatic notification of changes to
FPolicy events 80 106
FPolicy external engines 79 how to send feedback about 106
FPolicy policies 80
FPolicy scopes 82
security trace filters 94
E
enabling
D auditing on SVMs 40
auditing on the SVM 25
data access channels FPolicy policies 82, 84
how FPolicy connection credentials are used with error messages
privileged 48 No space left on device 44
how FPolicy uses privileged 48 event generation
data LIFs with audit policy configuration on the system 37
Index | 109
with authorization policy configuration on the how to troubleshoot staging volume space issues that
system 39 result in client access 44
with file-share event audit configuration on the feedback
system 37 how to send comments about documentation 106
with local security group is configured on the system file access auditing
38 requirements for using SMB/CIFS and NFS auditing
with local user account configuration on the system guide to understand, plan, and implement 6
37 file access events
event log formats using FPolicy to monitor 46
support for EVTX file format 12 file and directory auditing
support for XML file format 12 creating configuration on SVMs 23
event logs file and folder access
manually rotating audit 40 introduction to auditing NFS and SMB 8
supported file formats for audit 12 file and folder access events
viewing audit 12 SMB, that can be audited 13
Event Viewer file audit policies
how active audit logs are viewed using 13 introduction to configuring 26
events file events
CLI change, that can be audited 34 creating auditing configuration for 23
command for displaying information about FPolicy file formats
85 viewing audit event logs with XML or EVTX 12
command for modifying FPolicy 83 file operations
creating auditing configuration for file and directory displaying security trace results for 97
23 supported combinations for NFSv4 FPolicy events
creating FPolicy 80 69
information to gather for configuring FPolicy 70 supported combinations of file operations and filters
planning the configuration for FPolicy 64 for SMB FPolicy events 68
SMB, that can be audited 13 supported combinations with filters for NFSv3
supported combinations of file operations and filters FPolicy events 69
that FPolicy can monitor for NFSv3 69 file policy management, Fpolicy
supported combinations of file operations and filters requirements for using SMB/CIFS and NFS auditing
that FPolicy can monitor for NFSv4 69 guide to understand, plan, and implement 6
supported combinations of file operations and filters file security
that FPolicy can monitor for SMB 68 wildcard character (*) to display information about
EVTX 33
file format, viewing audit event logs with 12 file-share events
supported audit event log file format 12 generated when the CIFS network share is modified
express guides 37
additional documentation 102 files
external communication configuring NTFS audit policies using the Windows
how FPolicy handles during node failover 50 Security tab on 26
external engines how to troubleshoot space issues related to volumes
command for displaying information about FPolicy that contain staging 44
85 filters
command for modifying FPolicy 83 creating security trace 94
creating FPolicy 79 displaying security trace 96
information to gather for configuring FPolicy 63 supported combinations for NFSv4 FPolicy events
planning the configuration for FPolicy 57 69
external FPolicy servers supported combinations of file operations and filters
configuration type defined 51 for SMB FPolicy events 68
connecting to 87 supported combinations with file operations for
disconnecting from 88 NFSv3 FPolicy events 69
displaying information about connections to 88 FlexVol volumes
how FPolicy works with external FPolicy servers 48 planning the auditing configuration on SVMs with
when to create FPolicy configurations that use 52 19
folder audit policies
introduction to configuring 26
F FPolicy
failover how passthrough-read enhances usability for HSM
how FPolicy handles external communication during 52
node 50 how read requests are managed when passthrough-
failures read is enabled 53
110 | SMB/CIFS and NFS Auditing and Security Tracing Guide
upgrade and revert considerations for passthrough- security certificates for SSL authentication with
read 55 FPolicy do not replicate in SVM non-ID-preserve
Fpolicy auditing configurations 62
requirements for using SMB/CIFS and NFS auditing with MetroCluster and SVM disaster recovery,
guide to understand, plan, and implement 6 restrictions when choosing authentication methods
FPolicy best practices for 63
for setup 54 FPolicy external servers
FPolicy communications See FPolicy servers
synchronous and asynchronous notifications, defined FPolicy framework
46 defined 46
FPolicy configuration types protocols that can be monitored 46
defined 51 roles that cluster components play with 47
when to create a native FPolicy configuration 52 what it does 46
when to create configurations that use external FPolicy notifications
FPolicy servers 52 synchronous and asynchronous, defined 46
FPolicy configurations FPolicy policies
commands for displaying information about 85 creating 80
commands for modifying 83 displaying information about enabled 86
creating 78 displaying information about status 85
displaying information about 84 enabling 82
how show commands work when displaying enabling or disabling 84
information about 85 how FPolicy manages processing multiple 49
information about requirements, considerations, and information to gather for configuration 75
best practices 53 planning the configuration for 70
overview of configuration planning 56 requirements for FPolicy scopes if using the native
steps to setup 55 engine for 74
FPolicy connections FPolicy scopes
displaying information about external server configuration information to gather 77
connections 88 creating 82
how connection credentials are used with privileged planning the configuration for 75
data access channels 48 requirements if using the FPolicy policy uses the
how control channels are used with 48 native engine 74
how data LIF migrations and failovers are handled FPolicy servers
50 connecting to external 87
how privileged data access channels are used 48 disconnecting from external 88
management responsibilities when connecting to displaying information about connections to external
external FPolicy servers 48 88
synchronous and asynchronous applications 47 displaying information about FPolicy passthrough-
synchronous and asynchronous notifications, defined read connection status 90
46 how FPolicy works with external FPolicy servers 48
what it means to grant super user credentials for what the communication process to nodes is 49
privileged data access 49 what they do 46
what the node-to-external FPolicy server when to create FPolicy configurations that use
communication process is 49 external 52
FPolicy events FPolicy services
creating 80 how they work across SVM namespaces 51
information to gather for configuring 70 FPolicy setup
planning the configuration for 64 recommendations for 54
supported combinations of file operations and filters requirements for 54
for NFSv3 69
supported combinations of file operations and filters
for NFSv4 69
G
supported combinations of file operations and filters guaranteed auditing
that FPolicy can monitor for SMB 68 how ONTAP ensures 9
FPolicy external communication
how managed during node failovers 50
FPolicy external engines H
additional information about configuring SSL
hard links
authenticated connections for 62
considerations when auditing 16
creating 79
hierarchical storage management
information to gather for configuring 63
See HSM
planning the configuration for 57
how to
Index | 111