กิจกรรม
29 เม.ย. 14 - 30 เม.ย. 19
Microsoft เข้าร่วมการแข่งขันเสมือนจริงของ Windows Server ในวันที่ 29-30 เมษายนสําหรับเซสชันทางเทคนิคเชิงลึกและ Q&A แบบสดกับวิศวกรของ Microsoft
ลงทะเบียนเลยตอนนี้เบราว์เซอร์นี้ไม่ได้รับการสนับสนุนอีกต่อไป
อัปเกรดเป็น Microsoft Edge เพื่อใช้ประโยชน์จากคุณลักษณะล่าสุด เช่น การอัปเดตความปลอดภัยและการสนับสนุนด้านเทคนิค
There are three types of logging for Network Policy Server (NPS):
Event logging. Used primarily for auditing and troubleshooting connection attempts. You can configure NPS event logging by obtaining the NPS properties in the NPS console.
Logging user authentication and accounting requests to a local file. Used primarily for connection analysis and billing purposes. Also useful as a security investigation tool because it provides you with a method of tracking the activity of a malicious user after an attack. You can configure local file logging using the Accounting Configuration wizard.
Logging user authentication and accounting requests to a Microsoft SQL Server XML-compliant database. Used to allow multiple servers running NPS to have one data source. Also provides the advantages of using a relational database. You can configure SQL Server logging by using the Accounting Configuration wizard.
By using the Accounting Configuration wizard, you can configure the following four accounting settings:
In addition to these settings, both SQL Server logging and text logging allow you to specify whether NPS continues to process connection requests if logging fails. You can specify this in the Logging failure action section in local file logging properties, in SQL server logging properties, and while you are running the Accounting Configuration Wizard.
To run the Accounting Configuration Wizard, complete the following steps:
You can configure Network Policy Server (NPS) to perform Remote Authentication Dial-In User Service (RADIUS) accounting for user authentication requests, Access-Accept messages, Access-Reject messages, accounting requests and responses, and periodic status updates. You can use this procedure to configure the log files in which you want to store the accounting data.
For more information about interpreting log files, see Interpret NPS Database Format Log Files.
To prevent the log files from filling the hard drive, it is strongly recommended that you keep them on a partition that is separate from the system partition. The following provides more information about configuring accounting for NPS:
To send the log file data for collection by another process, you can configure NPS to write to a named pipe. To use named pipes, set the log file folder to \.\pipe or \ComputerName\pipe. The named pipe server program creates a named pipe called \.\pipe\iaslog.log to accept the data. In the Local file properties dialog box, in Create a new log file, select Never (unlimited file size) when you use named pipes.
The log file directory can be created by using system environment variables (instead of user variables), such as %systemdrive%, %systemroot%, and %windir%. For example, the following path, using the environment variable %windir%, locates the log file at the system directory in the subfolder \System32\Logs (that is, %windir%\System32\Logs).
Switching log file formats does not cause a new log to be created. If you change log file formats, the file that is active at the time of the change will contain a mixture of the two formats (records at the start of the log will have the previous format, and records at the end of the log will have the new format).
If RADIUS accounting fails due to a full hard disk drive or other causes, NPS stops processing connection requests, preventing users from accessing network resources.
NPS provides the ability to log to a Microsoft® SQL Server™ database in addition to, or instead of, logging to a local file.
Membership in the Domain Admins group is the minimum required to perform this procedure.
You can use this procedure to log RADIUS accounting data to a local or remote database running Microsoft SQL Server.
หมายเหตุ
NPS formats accounting data as an XML document that it sends to the report_event stored procedure in the SQL Server database that you designate in NPS. For SQL Server logging to function properly, you must have a stored procedure named report_event in the SQL Server database that can receive and parse the XML documents from NPS.
Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure.
Some RADIUS proxy servers and network access servers periodically send authentication and accounting requests (known as ping requests) to verify that the NPS is present on the network. These ping requests include fictional user names. When NPS processes these requests, the event and accounting logs become filled with access reject records, making it more difficult to keep track of valid records.
When you configure a registry entry for ping user-name, NPS matches the registry entry value against the user name value in ping requests by other servers. A ping user-name registry entry specifies the fictional user name (or a user name pattern, with variables, that matches the fictional user name) sent by RADIUS proxy servers and network access servers. When NPS receives ping requests that match the ping user-name registry entry value, NPS rejects the authentication requests without processing the request. NPS does not record transactions involving the fictional user name in any log files, which makes the event log easier to interpret.
Ping user-name is not installed by default. You must add ping user-name to the registry. You can add an entry to the registry using Registry Editor.
ข้อควรระวัง
Incorrectly editing the registry might severely damage your system. Before making changes to the registry, you should back up any valued data on the computer.
Ping user-name can be added to the following registry key as a string value by a member of the local Administrators group:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\IAS\Parameters
ping user-name
REG_SZ
เคล็ดลับ
To indicate more than one user name for a ping user-name value, enter a name pattern, such as a DNS name, including wildcard characters, in Data.
กิจกรรม
29 เม.ย. 14 - 30 เม.ย. 19
Microsoft เข้าร่วมการแข่งขันเสมือนจริงของ Windows Server ในวันที่ 29-30 เมษายนสําหรับเซสชันทางเทคนิคเชิงลึกและ Q&A แบบสดกับวิศวกรของ Microsoft
ลงทะเบียนเลยตอนนี้การฝึกอบรม
เส้นทางการเรียนรู้
MD-100 Configure authorization and authentication - Training
MD-100 Configure authorization and authentication