Enable the Security Auditing of Active Directory

8 Pages • 1,201 Words • PDF • 1021.5 KB
Uploaded at 2021-09-24 12:20

This document was submitted by our user and they confirm that they have the consent to share it. Assuming that you are writer or own the copyright of this document, report to us by using this DMCA report button.


How to enable the Security Auditing of Active Directory

Lepide Software B 57, Sector 57 Noida, U.P. India 201301 Phone: +91 (120) 4282353 Fax: +91 (120) 4282354 www.lepide.com

Millions of organizations from all parts of the world use Windows Server 2008 R2. It is quite necessary to audit the Active Directory from both security point of view and meeting the requirements of different compliances. In this post, we will discuss the methods to enable the security audit and to verify the enabled audit policies for Active Directory in Windows Server 2008 R2. Enabling the Security Auditing For security auditing, it is required to modify the existing default Domain’s policy, which is setup while creating a domain. You have to, in fact, deal with Advanced Audit Policy Configuration for this. Follow the steps below for enabling the security auditing of Active Directory in Windows 2008 R2.

1. Go to “Start Menu”  “Administrative Tools”  “Group Policy Management”. 2. In the console tree in the left pane, go to “Forest”  “Domains”  Domain Name. Expand it. 3. Right click on “Default Domain Policy” and click “Edit”. It will show “Group Policy Management Editor”. 4. Go to “Computer Configuration”  “Windows Settings”  “Security Settings”  “Advanced Audit Policy Configuration”  “Audit Policies”. This will list all available audit policies. 5. Here, you can enable the following policies for following purposes: Type of Auditing Domain Logon/Logoff Auditing

Path In “Logon/Logoff”, enable

File System Auditing

1. Audit Logon 2. Audit Logoff In “Object Access”, enable

Handle Manipulation Auditing

1. Audit Detailed File Share 2. Audit File Share 3. Audit File System In “Object Access”, enable 1. Audit Handle Manipulation

Table 1: Tables of required auditing values

6. Double-click any of the events listed in the above table to access its properties. 7. Check the box “Configure the following audit events” and then enable the required “Success” and “Failure” events. 8. Click “Apply” and “OK” to enable the monitoring for the selected events.

Lepide Software B 57, Sector 57 Noida, U.P. India 201301 Phone: +91 (120) 4282353 Fax: +91 (120) 4282354 www.lepide.com

Similarly, you can configure the advanced auditing options as well.

policies for other available

Enabling the Global Object Access Auditing Perform the below mentioned steps to audit the access of any object globally in the server. 1. Go to “Start Menu”  “Administrative Tools”  “Group Policy Management”. 2. In the console tree in the left pane, go to “Forest”  “Domains”  Domain Name. 3. Right click on “Default Domain Policy” and click “Edit”. It will show “Group Policy Management Editor”. 4. Go to “Computer Configuration”  “Windows Settings”  “Security Settings”  “Advanced Audit Policy Configuration”  “Audit Policies”. 5. Go to “Object Access”. This will show the audit policies of object access in the right panel. 6. Double-click “Audit Registry” to show its properties box. 7. Check the box “Configure the following audit events” and check the both events. 8. Click “Apply” and “OK”. 9. Now, go to “Global Object Access Auditing” node under “Audit Policies” of advanced configuration. 10. Double-click “Registry” entry in the right details pane. 11. Check the box “Define this policy”. This will enable the subsequent button.

Lepide Software B 57, Sector 57 Noida, U.P. India 201301 Phone: +91 (120) 4282353 Fax: +91 (120) 4282354 www.lepide.com

Figure 1: Properties of Registry policy

12. Click “Configure” to access the “Advanced Settings for Global Registry SACL”.

Figure 2: Advanced Security Settings 13. Click the “Add” button to add the users which access you want to audit. 14. Type the name of any user to be audited. 15. Click “Check Names” to validate them.

Lepide Software B 57, Sector 57 Noida, U.P. India 201301 Phone: +91 (120) 4282353 Fax: +91 (120) 4282354 www.lepide.com

16. Click “OK” for adding the users. This will show the auditing entries for that user.

Figure 3: Select Audit Entries

17. Select the audit entries for both success and failure, which you want to monitor and click the “OK” button. It is advised to select Full Control for both of them. 18. Click “OK” once the required entries are selected. This will take you back to the “Advanced Security Settings”. 19. You can follow the same steps to configure security auditing for other users. 20. Once done, click “Apply” and “OK”. You will be returned to “Registry Properties”. 21. Click “Apply” and “OK” once again.

Lepide Software B 57, Sector 57 Noida, U.P. India 201301 Phone: +91 (120) 4282353 Fax: +91 (120) 4282354 www.lepide.com

Thus, you can follow the above mentioned steps to configure the advanced file system auditing by using the “File System” policy in “Global Object Access Auditing”.

Managing the Integrity of Advanced Auditing

The advanced auditing entries are often overwritten by that of basic auditing. Follow the steps below to ensure that the advanced auditing entries do not get overwritten. 1. Go to “Start Menu”  “Administrative Tools”  “Group Policy Management”. 2. In the console tree left pane, go to “Forest”  “Domains”  Domain Name. 3. Right-click on “Default Domain Policy” and click “Edit”. It will show “Group Policy Management Editor”. 4. In the left tree pane, go to “Computer Configuration”  “Policies”  “Windows Settings”  “Security Settings”  “Security Options”. 5. Double-click “Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings”. 6. Click “Define this policy setting” and click “Enabled”. 7. Click “Apply” and “OK” to close the dialog box. This will apply the modified security auditing policies on the server. Alternatively, you can logoff and logon the Administrator. It is required to update the modified Group Policies on the server after enabling the security auditing policies.

Lepide Software B 57, Sector 57 Noida, U.P. India 201301 Phone: +91 (120) 4282353 Fax: +91 (120) 4282354 www.lepide.com

Verifying the Auditing Policies It is recommended to verify whether the modified auditing policies have been applied or not. Run the following command on the Command Prompt. auditpol.exe /get /category:*

Figure 4: Listing the status of all policies This will list the status of all auditing policies – both basic and advanced on the server. Please verify both “Success” and “Failure” events for the policies, which you have enabled.

Lepide Software B 57, Sector 57 Noida, U.P. India 201301 Phone: +91 (120) 4282353 Fax: +91 (120) 4282354 www.lepide.com

Summary Thus, you can follow the above stated steps to enable security auditing for the Active Directory. You can also enable the auditing for specific files and folders. After verifying the update status, you can see the recorded events in the Security logs of Event Viewer as security auditing has been enabled. Also, you can make use of LepideAuditor Suite, which has a number of added features and it also lets you keep a live check on the changes being made in the Active Directory environment. Real-time alerts, live updates, and automatic reports let you audit the AD and Group Policy Objects without any issue. You also have the freedom to restore unwanted changes in the AD objects and restore the objects from Tombstone folder as well.

Lepide Software B 57, Sector 57 Noida, U.P. India 201301 Phone: +91 (120) 4282353 Fax: +91 (120) 4282354 www.lepide.com
Enable the Security Auditing of Active Directory

Related documents

8 Pages • 1,201 Words • PDF • 1021.5 KB

4 Pages • 634 Words • PDF • 174.2 KB

1,135 Pages • 369,180 Words • PDF • 10.2 MB

353 Pages • 104,120 Words • PDF • 5.6 MB

389 Pages • 101,660 Words • PDF • 4.6 MB

181 Pages • 66,513 Words • PDF • 2 MB

721 Pages • 204,505 Words • PDF • 5.1 MB