Image
{{'2018-04-27T15:29:03.0303075Z' | utcToLocalDate }}
Mark Allison

Hardening Sentry One for Security

If you have an environment where you need to lock down Sentry One as much as possible, then this article should help. It is well known that the Sentry One service account needs to be a member of the Local Administrators group in each server it monitors, and also a member of the sysadmin role for each SQL Server instance. At the moment this is still a requirement, but if you can live without the Windows metrics, then you could run Sentry One in Limited Mode which will only gather SQL Server specific metrics. Some of our clients run in this configuration for security reasons.

 

A recommended architecture is to run the following VMs:

  • Sentry One Monitoring server
  • Sentry One Database server
  • Sentry One Workstation with the client installed

 

As a Sentry One user, you should not need to log in to the Monitoring server or database server directly after initial setup. In the Sentry One database add your user account, or even better an AD Group with all the users you want to access Sentry One client to a selection of the following database roles in the SentryOne database depending on what you want to lock down:

 

allow_all
deny_actions_update
deny_contact_update
deny_customconditions_update
deny_eventchain_update
deny_settings_connection_update
deny_settings_object_update
deny_settings_source_update
deny_site_update
deny_watch_connection
deny_watch_object

 

Carefully read the following article and only remove the permissions that are not required for the users connecting to the Sentry One client.

https://cdn.sentryone.com/help/ug/webframe.html#Role_Based_Security_Overview.html

 

Or run this script:

 

Log in to the Sentry One client workstation using your normal locked-down AD account (not the Sentry One service account), and those functions will now be denied to you. For example, if you wanted to add an advisory condition to get all the credit card numbers from a target server, you now can’t do that:

 

image

 

You can also create an AD group and limit a group of users to only be able to look at certain servers by restricting it in the Sentry One GUI.

 

With the AD group concerned, link it in Sentry One to a new User by following this page. https://cdn.sentryone.com/help/ug/#SentryOne_Client_Security.html

The sequence will look like this:

 

clip_image002

In the Properties dialog, fill in the First Name, Login and Description fields. The Login field should be filled in by clicking the ellipsis to the right of that field so that it can be validated against AD.

clip_image004

Save the dialog by clicking the Save icon.

Close the dialog and reopen it and you should see a Rights Tab. In here you can specify which servers you want the group to see. Click Add… for each SQL Server and Windows Target you want the group to view performance metrics on. You can CTRL-Click for multiple servers.

 

clip_image006

Click Save when you are finished.

 

Suggestions for the Sentry One team:

  • Please allow the Sentry One service to use Group Managed Service Accounts
  • Please remove the requirement for Sentry One to be a Local Admin on Windows on targets
  • Please remove the requirement for Sentry One to be sysadmin on SQL Server instances and to use the finer grained permissions in SQL Server

 

 

 

 

comments powered by Disqus