Direct Inward Dialing: +1 408 916 9892
Securing Active Directory protects user accounts, company systems, software applications, and other critical components of an organization's IT infrastructure from unauthorized access.
ADAudit Plus is a real-time change auditing and user behavior analytics solution that helps secure Active Directory.
With ADAudit Plus you can audit all three major contexts of Active Directory, namely-
ADAudit Plus allows you to audit the following domain controller OS versions.
This guide takes you through the process of setting-up ADAudit Plus and your Active Directory environment for real-time auditing.
Audit policies must be configured to ensure that events are logged whenever any activity occurs.
ADAudit Plus can automatically configure the required audit policies for Active Directory auditing.
Note: Automatic audit policy configuration is not done without the users consent.
Steps for automatic audit policy configuration: Log in to the ADAudit Plus web console → Domain Settings → Audit Policy: Configure.
Advanced audit policies help administrators exercise granular control over which activities get recorded in the logs, helping cut down on event noise. It is recommended that advanced audit policies are configured on domain controllers running on Windows Server 2008 and above.
Cateogory | Sub Category | Audit Events |
---|---|---|
Account Logon |
|
Success and Failure |
Account Management |
|
Success |
|
Success and Failure | |
Detailed Tracking |
|
Success |
DS Access |
|
Success |
Logon /Logoff |
|
Success and Failure |
|
Success | |
Object Access |
|
Success |
Policy Change |
|
Success |
System |
|
Success |
When using advanced audit policies, ensure that they are forced over legacy audit policies.
The option to configure advanced audit policies is not available in Windows Server 2003 and below. Therefore for these systems, you need to configure the legacy audit policies.
Category | Audit Events |
---|---|
Account Logon | Success and Failure |
Audit Logon / Logoff | Success and Failure |
Account Management | Success |
Directory Service Access | Success |
Process Tracking | Success |
Object Access | Success |
System Events | Success |
Setting up object level auditing ensures that events are logged whenever any Active Directory object related activity occurs.
ADAudit Plus can automatically configure the required object level auditing.
Note: Automatic object level auditing configuration is not done without the users consent.
To initiate the configuration of object level auditing automatically, log in to the ADAudit Plus web console → Reports → GPO Management → GPO History → Object level auditing needs to be configured for getting proper reports: Configure.
Click on View and ensure that Advanced Features is enabled. This will display the advanced security settings for selected objects in Active Directory Users and Computers.
Note: Use Clear all to remove all permissions and properties before selecting the appropriate permissions.
Auditing Entry number | Auditing Entry for | Access | Apply onto Windows Server 2003 | Apply onto Windows Server 2008/Windows Server 2012 |
---|---|---|---|---|
1&2 | OU |
|
This object and all child objects | This object and all descendant objects |
|
Organizational Unit objects | Descendant Organizational Unit objects | ||
3&4 | GPO |
|
This object and all child objects | This object and all descendant objects |
|
groupPolicyContainer objects | Descendant groupPolicyContainer objects | ||
5&6 | User |
|
This object and all child objects | This object and all descendant objects |
|
User objects | Descendant User objects | ||
7&8 | Group |
|
This object and all child objects | This object and all descendant objects |
|
Group objects | Descendant Group objects | ||
9& 10 | Computer |
|
This object and all child objects | This object and all descendant objects |
|
Computer objects | Descendant Computer objects | ||
11&12 | Contact |
|
This object and all child objects | This object and all descendant objects |
|
Computer objects | Descendant Computer objects |
Note: All 12 Auditing Entries must be enabled.
Note: Use Clear all to remove all permissions and properties before selecting the appropriate permissions.
Auditing Entry | Access | Apply onto Windows Server 2003 | Apply onto Windows Server 2008/Windows Server 2012 |
---|---|---|---|
Container |
|
Container objects | Descendant Container objects |
Note: Use Clear all to remove all permissions and properties before selecting the appropriate permissions.
Auditing Entry number | Auditing Entry for | Access | Apply onto Windows Server 2003 | Apply onto Windows Server 2008/Windows Server 2012 |
---|---|---|---|---|
1&2 | Password Settings Container |
|
Not Applicable | This object and all descendant objects |
|
Not Applicable | Descendant msDS-PasswordSettings objects |
Note: Both Auditing Entries must be enabled.
Note: Use Clear all to remove all permissions and properties before selecting the appropriate permissions.
Auditing Entry for | Access | Apply onto Windows Server 2003 | Apply onto Windows Server 2008/Windows Server 2012 |
---|---|---|---|
Configuration |
|
This object and all child objects | This object and all |
Note: Use Clear all to remove all permissions and properties before selecting the appropriate permissions.
Auditing Entry for | Access | Apply onto Windows Server 2003 | Apply onto Windows Server 2008/Windows Server 2012 |
---|---|---|---|
Schema |
|
This object and all child objects | This object and all descendant objects |
Note: Use Clear all to remove all permissions and properties before selecting the appropriate permissions.
Auditing Entry number | Auditing Entries for | Access | Apply onto Windows Server 2003 | Apply onto Windows Server 2008/Windows Server 2012 |
---|---|---|---|---|
1&2 | DNS Zones |
|
This object and all child objects | This object and all descendant objects |
|
DNS Zone objects | Descendant DNS Zone objects | ||
3&4 | DNS Nodes |
|
This object and all child objects | Descendant DNS Zone objects |
|
DNS Node objects | Descendant DNS Node objects |
Note:
For both DNS Zones and DNS Nodes- the settings have to be applied according to your domain name and the partition where the Zone is stored.
For DNS Zones- auditing has to be enabled for each zone under the DNS container individually.
Note: Use Clear all to remove all permissions and properties before selecting the appropriate permissions.
Setting a threshold value for the event log size helps prevent the loss of audit data. If you've not specified the event log size in your system, older events will be overwritten.
Note: Ensure security event log holds minimum of 12hrs of data.
Role | Operating System | Size |
---|---|---|
Domain Controller | Windows Server 2003 | 512 MB |
Domain Controller | Windows Server 2008 and above | 1024 MB |
Log in to any computer that has the Group Policy Management Console (GPMC), with Domain Admin credentials → Open GPMC → Right click on Group Policy Results → Group Policy Results Wizard → Select the computer, user (current user) → Verify if the desired settings are configured.
Run through step 3.2 found in this document.
Log in to any computer with Domain Admin credentials → Open Run → Type eventvwr.msc → Right click on Event Viewer → Connect to the target computer → Verify if events corresponding to the audit policies configured are getting logged.
For example: Kerberos Authentication Service Success advanced audit policy configuration should result in event ID 4768 getting logged.