Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

 

How to audit DNS permission changes

Domain naming system (DNS) servers are crucial for the operation of any network. DNS records allow DNS servers to map name requests to their corresponding IP addresses. Improper configuration of DNS permissions can result in privilege misuse. Hence it is crucial to track DNS permission modifications for intrusion monitoring and to accelerate forensic analysis in case of a mishap.

Audit DNS permission changes
Free, fully functional 30-day trial
  • With Native AD Auditing

  • With ADAudit Plus

  • How to check DNS permission changes with ADAudit Plus
  • Once ADAudit Plus is installed, it automatically configures the audit policies required for Active Directory auditing.

  • To enable automatic configuration: Log in to the ADAudit Plus web console → Domain Settings → Audit Policy: Configure.

  • Permission changes in DNS records can be identified by following the steps below:

    1. Login to ADAudit Plus.

    2. Select the required Domain from the dropdown list.

    3. Go to the Reports tab.

    4. Navigate to Permission Changes.

    5. Select DNS Permission Changes.

    how-to-audit-dns-permission-changes-5 how-to-audit-dns-permission-changes-6
  • ADAudit Plus enables IT administrators to have a comprehensive picture of all the activities that happen within their organization's network. The real-time monitoring capabilities and out-of-the-box reports offered by ADAudit Plus make it easier to track critical changes in DNS permissions, and detect and prevent mishaps.

  • With native AD auditing, here is how you can monitor DNS permission changes:

  • Step 1: Enable 'Audit logon events' policy
  • Launch Server Manager in your Windows Server instance.

  • Under Manage, select Group Policy Management and launch the Group Policy Management console.

  • Navigate to Forest ➔ Domain ➔ Your domain ➔ Domain Controllers.

  • Create a new GPO and link it to the domain to be monitored, or edit any existing GPO that is linked to the domain to open the Group Policy Management Editor.

  • Navigate to Computer Configuration ➔ Windows Settings ➔ Security Settings ➔ Local Policies ➔ Audit Policy.

  • Under Audit Policy turn auditing on for Success of Audit Directory Service Access policy.

    how-to-audit-dns-permission-changes-1
  • Step 2: Allow AD Auditing through ADSI Edit
  • From your Server Manager go to Tools and select ADSI Edit.

  • Right click ADSI Edit node from the left pane and select Connect to option. This pulls up the Connection Settings window.

  • Select the Default Naming Context option from the Select a well-known Naming Context drop down list.

    how-to-audit-dns-permission-changes-2
  • Click OK and return to the ADSI Edit window. Expand Default Naming Context and select the associated DC subnode. Right-click this subnode, and click Properties.

  • In the Properties window, go to the Security tab and select Advanced. After that select Auditing tab and click Add.

  • Apply the following settings

    1. Principal: Everyone

    2. Type: Success

    3. Applies to: This object and all descendant objects

    4. Permissions: Select Write all properties, Delete, Delete subtree check boxes.

  • Click Apply, then OK, and close the console.

  • Step 3: Enable Auditing through DNS Manager
  • From your Server Manager go to Tools and select DNS.

    how-to-audit-dns-permission-changes-3
  • Expand your servername and select Forward Lookup Zone.

  • Right click the zone you want to audit, and click on Properties.

  • In the Properties window, go to the Security tab and select Advanced. After that select Auditing tab, and click Add.

  • Apply the following settings

    1. Principal: Everyone

    2. Type: Success

    3. Applies to: This object and all descendant objects

    4. Permissions: Select Write all properties, Delete, Delete subtree check boxes.

  • Click Apply, then OK, and close the console.

  • Step 4: View events in Event Viewer
  • In Event Viewer window, go to Windows Logs ➔ Security logs.

  • Click on Filter current log under Action in the right panel.

  • Search for Event ID 5136, which identifies DNS permission changes.

  • You can double-click on the event to view Event Properties.

    how-to-audit-dns-permission-changes-4
  • These steps need to be repeated for all the zones to audit changes in DNS permissions. Manually checking every event is time-consuming, inefficient, and practically impossible for large organizations.

Native auditing becoming a little too much?

Simplify DNS permission changes auditing and reporting with ADAudit Plus.

Get Your Free Trial Fully functional 30-day trial

ADAudit Plus simplifies monitoring of DNS permission changes by offering predefined DNS Permissions Changes reports along with intuitive graphical representation of the same for the ease of comprehension. ADAudit Plus also provides you the option to generate custom reports and export them in your preferred format (PDF, XLS, HTML, and CSV). .

Request 1-on-1 demo

  •  
  •  
  •  
  •  
  •  
  • -Select-
  • By clicking 'Submit' you agree to processing of personal data according to the Privacy Policy.

Thanks

One of our solution experts will get in touch with you shortly.

ADAudit Plus Trusted By