Direct Inward Dialing: +1 408 916 9892
No results found
OverviewQuick start System requirementsQuick start PrerequisitesQuick start Deploying ADAudit PlusQuick start Configure components in ADAudit PlusQuick start Related documentationQuick start OverviewActive Directory > Active Directory auditing Configure AD domains and DCs - Automatic configurationActive Directory > Active Directory auditing Configure AD domains and DCs - Manual configurationActive Directory > Active Directory auditing Configure audit policies - Automatic configurationActive Directory > Active Directory auditing Configure audit policies - Manual configurationActive Directory > Active Directory auditing Configure object level auditing - Automatic configurationActive Directory > Active Directory auditing Configure object level auditing - Manual configurationActive Directory > Active Directory auditing Configure event log settingsActive Directory > Active Directory auditing TroubleshootingActive Directory > Active Directory auditing OverviewWindows Server > Removable storage auditing Configure USB AuditingWindows Server > Removable storage auditing TroubleshootingWindows Server > Removable storage auditing OverviewFile Server > Windows file server Supported systemsFile Server > Windows file server Configure Windows file servers - One server at a timeFile Server > Windows file server Configure Windows file servers - In bulkFile Server > Windows file server Configure audit policies - Automatic configurationFile Server > Windows file server Configure audit policies - Manual configurationFile Server > Windows file server Configure object-level auditing - Automatic configurationFile Server > Windows file server Configure object-level auditing - Manual configurationFile Server > Windows file server Configure object-level auditing - Using PowerShell cmdletsFile Server > Windows file server Configure event log settingsFile Server > Windows file server Exclude configurationFile Server > Windows file server File AnalysisFile Server > Windows file server TroubleshootingFile Server > Windows file server OverviewFile Server > EMC server auditing Privileges requiredFile Server > EMC server auditing Adding EMC serversFile Server > EMC server auditing Configure audit policiesFile Server > EMC server auditing Configure event log settingsFile Server > EMC server auditing Automatic configurationFile Server > EMC server auditing Manual configurationFile Server > EMC server auditing Exclusion configurationFile Server > EMC server auditing TroubleshootingFile Server > EMC server auditing OverviewWindows Server > Windows Server Auditing Using product consoleWindows Server > Windows Server Auditing Using command line argumentsWindows Server > Windows Server Auditing Configure audit policies automaticallyWindows Server > Windows Server Auditing Configure audit policies manuallyWindows Server > Windows Server Auditing Remove Apply Group Policy privilege for Authenticated UsersWindows Server > Windows Server Auditing Create a new group, add all Windows servers to the group, and link a GPO to the groupWindows Server > Windows Server Auditing Configure advanced audit policiesWindows Server > Windows Server Auditing Force advanced audit policiesWindows Server > Windows Server Auditing Configure legacy audit policiesWindows Server > Windows Server Auditing Configure event log settingsWindows Server > Windows Server Auditing TroubleshootingWindows Server > Windows Server Auditing OverviewActive Directory > Group policy object auditing Benefits of auditing Group Policy Objects using ADAudit PlusActive Directory > Group policy object auditing Configure domain controllersActive Directory > Group policy object auditing Configure audit controllers - Automatic processActive Directory > Group policy object auditing Configure audit controllers - Manual processActive Directory > Group policy object auditing Configure Object-level auditong - Automatic processActive Directory > Group policy object auditing Configure Object-level auditong - Manual processActive Directory > Group policy object auditing Configure event log settingsActive Directory > Group policy object auditing Install the Group Policy Management ConsoleActive Directory > Group policy object auditing OverviewActive Directory > ADFS auditing Configure AD FS servers in ADAudit PlusActive Directory > ADFS auditing Configure audit policies - Automatic configurationActive Directory > ADFS auditing Configure audit policies - Manual configurationActive Directory > ADFS auditing Configure AD FS servers for auditing - Enable auditingActive Directory > ADFS auditing Configure AD FS servers for auditing - Configure claimsActive Directory > ADFS auditing Configure AD FS servers for auditing - Configure extranet lockoutActive Directory > ADFS auditing TroubleshootingActive Directory > ADFS auditing OverviewWindows workstation auditing Configuring windows workstations - Using product consoleWindows workstation auditing Configuring windows workstations - Using command ine argumentsWindows workstation auditing Configuring audit policies - Automatic ProcessWindows workstation auditing Configuring audit policies - Manual ProcessWindows workstation auditing Configuring event log settingsWindows workstation auditing TroubleshootingWindows workstation auditing OverviewWindows Server > File integrity monitoring Configure FIM in ADAudit PlusWindows Server > File integrity monitoring Configure audit policies - Automatic configurationWindows Server > File integrity monitoring Configure audit policies - Manual configurationWindows Server > File integrity monitoring Configure object-level auditing - Using Windows sharesWindows Server > File integrity monitoring Configure object-level auditing - Using PowerShell cmdletsWindows Server > File integrity monitoring Configure object-level auditing - Using Global Object Access Auditing settingsWindows Server > File integrity monitoring Exclude configurationWindows Server > File integrity monitoring Configuring event log settingsWindows Server > File integrity monitoring OverviewWindows Server > PowerShell auditing Configure audit policies - Automatic configurationWindows Server > PowerShell auditing Configure audit policies - Manual configurationWindows Server > PowerShell auditing Configure PowerShell in ADAudit PlusWindows Server > PowerShell auditing Configuring event log settingsWindows Server > PowerShell auditing TroubleshootingWindows Server > PowerShell auditing User session recordingWindows Server > User session recording OverviewFile Server > EMC Isilon auditing Privileges requiredFile Server > EMC Isilon auditing Configure EMC Isilon auditingFile Server > EMC Isilon auditing Add EMC Isilon clustersFile Server > EMC Isilon auditing Exclude configurationFile Server > EMC Isilon auditing TroubleshootingFile Server > EMC Isilon auditing OverviewFile Server > Synology auditing Configure Synology NAS auditingFile Server > Synology auditing TroubleshootingFile Server > Synology auditing OverviewProduct Configuration > SSL configuration Steps for enabling sslProduct Configuration > SSL configuration Product Configuration > GlossarySSL configuration OverviewProduct Configuration > Service account configuration New user, group, and GPO creationProduct Configuration > Service account configuration Privileges required for event log collectionProduct Configuration > Service account configuration Privileges required for automatic audit policy and object level auditing configurationProduct Configuration > Service account configuration Privileges required for file server auditingProduct Configuration > Service account configuration For DataEngine Product Configuration > Service account configuration Other privileges requiredProduct Configuration > Service account configuration Products and System PortsProduct Configuration > Ports OverviewProduct Configuration > Agent configuration Installation prerequisitesProduct Configuration > Agent configuration Agent installationProduct Configuration > Agent configuration Agent security settingsProduct Configuration > Agent configuration Agent configuration syncProduct Configuration > Agent configuration Upgrading the agentProduct Configuration > Agent configuration Agent uninstallationProduct Configuration > Agent configuration TroubleshootingProduct Configuration > Agent configuration PostgreSQL/MySQL to MS SQL MigrationMigration Migrating data between different versions of MS SQLMigration MySQL/MS SQL to PostgreSQL MigrationMigration Moving ADAudit Plus from one server/drive to anotherMigration Migrating ADAudit Plus from 32-bit to 64-bit architectureMigration Backup and restoreMigration To enable NTLM-based single sign-onProduct Configuration > Single sign-on To modify existing single sign-on settingsProduct Configuration > Single sign-on Troubleshooting steps for NTLM-based SSOProduct Configuration > Single sign-on Configuring SSO using OktaProduct Configuration > Single sign-on Configuring SSO using OneLoginProduct Configuration > Single sign-on Configuring SSO using Ping IdentityProduct Configuration > Single sign-on Configuring SSO using ADFSProduct Configuration > Single sign-on Configuring SSO using a custom identity providerProduct Configuration > Single sign-on Troubleshooting tips for SAML-based SSOProduct Configuration > Single sign-on OverviewSecurity > Security specifications Potential vulnerabilitiesSecurity > Security specifications Security > Security specificationsSecurity > Security specifications ArchitectureArchitecture Security Log SettingsProduct configuration > Security log settings Security hardeningProduct configuration > Security hardening OverviewActive Directory > Azure AD configuration Configuration type M365 vs Azure AppActive Directory > Azure AD configuration Using an Azure AD Premium licenseActive Directory > Azure AD configuration Using a Microsoft 365 licenseActive Directory > Azure AD configuration ADAudit Plus vs. Azure portalActive Directory > Azure AD configuration ADAudit Plus vs. PowerShell cmdletsActive Directory > Azure AD configuration Event categories trackedActive Directory > Azure AD configuration Log retention settings in Azure ADActive Directory > Azure AD configuration TroubleshootingActive Directory > Azure AD configuration OverviewActive Directory > Azure AD DS auditing Reporting capabilities of ADAudit PlusActive Directory > Azure AD DS auditing Azure AD DS configurationActive Directory > Azure AD DS auditing Configure Azure AD DS in ADAuditPlusActive Directory > Azure AD DS auditing TroubleshootingActive Directory > Azure AD DS auditing OverviewProduct configuration > 2FA configuration Enable 2FA in ADAudit PlusProduct configuration > 2FA configuration Email VerificationProduct configuration > 2FA configuration SMS VerificationProduct configuration > 2FA configuration Google AuthenticatorProduct configuration > 2FA configuration RSA SecurIDProduct configuration > 2FA configuration Duo SecurityProduct configuration > 2FA configuration RADIUS AuthenticationProduct configuration > 2FA configuration Set a preferred authentication modeProduct configuration > 2FA configuration Reset the second authentication factorProduct configuration > 2FA configuration OverviewFile server > Huawei OceanStor Auditing Privileges requiredFile server > Huawei OceanStor Auditing Configuration prerequisitesFile server > Huawei OceanStor Auditing Adding Huawei OceanStor systemsFile server > Huawei OceanStor Auditing Exclude configurationFile server > Huawei OceanStor Auditing TroubleshootingFile server > Huawei OceanStor Auditing OverviewEvent collection troubleshooting Domain errorsEvent collection troubleshooting Report based errorsEvent collection troubleshooting General errorsEvent collection troubleshooting Netapp filer errorsEvent collection troubleshooting EMC errorsEvent collection troubleshooting Synology errorsEvent collection troubleshooting Hitachi errorsEvent collection troubleshooting OverviewProduct configuration > High availability configuration High availability workflowProduct configuration > High availability configuration PrerequisitesProduct configuration > High availability configuration High availability setupProduct configuration > High availability configuration OverviewFile server > NetApp filer auditing Adding NetApp 7Mode/vFiler CIFS serverFile server > NetApp filer auditing Automatic configurationFile server > NetApp filer auditing Manual configurationFile server > NetApp filer auditing Automatic configurationFile server > NetApp filer auditing Manual configurationFile server > NetApp filer auditing Exclude ConfigurationFile server > NetApp filer auditing TroubleshootingFile server > NetApp filer auditing OverviewFile server > NetApp cluster auditing Configuration prerequisitesFile server > NetApp cluster auditing Adding the target clusterFile server > NetApp cluster auditing Adding the target sharesFile server > NetApp cluster auditing Configuring audit optionsFile server > NetApp cluster auditing Exclude ConfigurationFile server > NetApp cluster auditing OverviewFile server > Hitachi NAS auditing Privileges requiredFile server > Hitachi NAS auditing Add a Hitachi NAS serverFile server > Hitachi NAS auditing Configure audit policiesFile server > Hitachi NAS auditing Configure object-level auditingFile server > Hitachi NAS auditing Exclude ConfigurationFile server > Hitachi NAS auditing TroubleshootingFile server > Hitachi NAS auditing OverviewFile server > Amazon FSx auditing guide PrerequisitesFile server > Amazon FSx auditing guide Configure audit policiesFile server > Amazon FSx auditing guide Configure object-level auditingFile server > Amazon FSx auditing guide Configure Amazon FSx in ADAudit PlusFile server > Amazon FSx auditing guide TroubleshootingFile server > Amazon FSx auditing guide OverviewProduct configuation > Email server configuration SMTP mail server configurationProduct configuation > Email server configuration API mail server configurationProduct configuation > Email server configuration Add/Remove devices and sharesProduct configuation > automatic-configurationWith the increasing amount of attention on information security, it is essential for all IT administrators to strengthen security within their existing infrastructure to avoid possible breaches. This document focuses on the best ways to configure ADAudit Plus to ensure that your information stays secure.
An Active Directory (AD) user account is generally associated with ADAudit Plus for the collection of logged data. If a domain administrator account is used, ADAudit Plus instantly starts auditing changes within your AD environment. But, in general, a domain administrator account has several elevated rights and privileges not required by ADAudit Plus. This is why we recommend creating dedicated user accounts that only have the privileges and permissions needed for ADAudit Plus to perform its job. This way, even if a dedicated user account is compromised, the impact of the breach is innately contained. Here are the required privileges and permissions for ADAudit Plus.
ADAudit Plus comes with a built-in admin account with ultimate privileges. By default, this account's password is the same for every customer of ADAudit Plus, which means you need to change this password in order to properly secure it. If this step is overlooked, you will leave your system vulnerable.
We recommend that you use HTTPS over HTTP to ensure secure transportation of information over your network. You can do this from within the user interface under the Admin tab. Navigate to the settings found under General Settings → Connection.
These settings can be further optimized from within the following XML file:
If you choose to allow only a particular version of Transport Layer Security (TLS), namely TLSv1, TLSv1.1, or TLSv1.2, you can disable the other versions by modifying the following parameter, keeping only the required TLS versions:
If you want to disable or restrict ciphers, you can do so by modifying the following parameter to only contain the required ciphers:
With these changes, you can secure all communication through ADAudit Plus and strengthen security.
To further strengthen ADAudit Plus' security, we recommend that you restrict logon access to the ADAudit Plus server, thereby preventing unwarranted access. You can define the local policy settings in the User Rights Assignment tab within the Group Policy Management Editor to Allow log on locally or Allow log on through Remote Desktop Services, only to a specific set of users. This way, you reduce the attack surface of your infrastructure.
Administrators can restrict access to the ADAudit Plus installation folder by modifying folder permissions. This ensures that no one except permitted users have access to ADAudit Plus' files.
ADAudit Plus logs changes to its installation folder by configuring the System Access Control List (SACL) if file integrity monitoring (FIM) is enabled on the server where the application is installed. This way, you can be sure that no one has tampered with the information.
Note: This also requires the appropriate license.
ADAudit Plus comes with a built-in, password-protected PostgreSQL database, allowing only authorized personnel access. By default, the PostgreSQL service creates a user account with unrestricted privileges—similar to a domain administrator account in AD—to perform various administrative actions. ADAudit Plus changes the default password of this account and creates another user account with limited privileges. This new account has restricted permission, is used to connect to the database, and is encrypted to ensure security.
Technician roles can be configured to limit access to certain reports. These roles can also restrict technicians from performing administrative functions such as adding or removing servers for auditing, modifying configuration settings, etc. In addition, ADAudit Plus provides a detailed user-based audit trail of all actions performed.
For collecting event logs, ADAudit Plus lets you choose between the following event fetch modes:
By default, Real-time and EvtQuery modes encrypt data transferred over the network. The WMI and the Native modes, by default, do not encrypt transferred data, but encryption can be enabled on the WMI mode for enhanced security. We recommend that administrators use the Real-time mode to ensure secure data transfer and to get instant updates on all AD changes.
ADAudit Plus, by default, disables database access from within its user interface and permits only the default administrator account to enable this option. The administrator can also choose which accounts have this privilege. This prevents other technician accounts from modifying or deleting information from the database.
In order to reduce storage space consumption within the database, historical data can be compressed and stored separately. These files can then be restored at a later point in time. These archived files are password protected by ADAudit Plus to ensure security. For an additional layer of security, we recommend that you restrict access to the folders containing these files.
When a user exports a report in a particular format (PDF, CSV, etc.), or when a user schedules a particular report to be saved locally, the files are password protected by ADAudit Plus. It's also recommended that you modify the folder permissions for the folder that contains these files to prevent unwarranted access.
ADAudit Plus allows administrators to enable Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) to ensure that all communication of Active Directory data is encrypted. This can be performed from within ADAudit Plus' user interface under Connection settings.