- Related Products
- ADManager Plus
- ADSelfService Plus
- EventLog Analyzer
- Exchange Reporter Plus
- AD360
- Log360
Audit policies must be configured to ensure that events are logged whenever any activity occurs.
Advanced audit policies help administrators exercise granular control over which activities get recorded in the logs, helping cut down on event noise. It is recommended that advanced audit policies are configured on domain controllers running on Windows Server 2008 and above.
Category | Sub Category | Audit Events |
---|---|---|
Account Logon |
|
Success and Failure |
Account Management |
|
Success |
|
Success and Failure | |
Detailed Tracking |
|
Success |
DS Access |
|
Success |
Logon /Logoff |
|
Success and Failure |
|
Success | |
Object Access |
|
Success |
Policy Change |
|
Success |
System |
|
Success |
Image showing: Account Logon category → Audit Kerberos Authentication Service subcategory → Both Success and Failure configured.
When using advanced audit policies, ensure that they are forced over legacy audit policies.
The option to configure advanced audit policies is not available in Windows Server 2003 and below. Therefore for these systems, you need to configure the legacy audit policies.
Category | Audit Events |
---|---|
Account Logon | Success and Failure |
Audit Logon / Logoff | Success and Failure |
Account Management | Success |
Directory Service Access | Success |
Process Tracking | Success |
Object Access | Success |
System Events | Success |
Image showing: Audit account logon events category → Both Success and Failure configured.
Note: To enable auditing of NTLM events, log in to ADAudit Plus' web console → Click on the Support tab > Under Support Info, click on More > Under Configuration, click on Enable/Disable Configuration settings > Enable NTLM Auditing.