How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Lepide Software



Similar documents
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

ENABLE LOGON/LOGOFF AUDITING

Installing Client GPO Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Automatic Network Deployment

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

Virtual Office Remote Installation Guide

SARANGSoft WinBackup Business v2.5 Client Installation Guide

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Director and Windows Server 2008 (and 2003)

Create, Link, or Edit a GPO with Active Directory Users and Computers

LepideAuditor Suite for File Server. Installation and Configuration Guide

Restoring Files. Table of Content. No-Backup. Official website: Restoring Files

Lab A: Deploying and Managing Software by Using Group Policy Answer Key

Windows Clients and GoPrint Print Queues

TROUBLESHOOTING INCORRECT REPORTING OF THE WHO CHANGED PARAMETER

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory

EventTracker: Support to Non English Systems

SQL Express to SQL Server Database Migration Goliath Performance Monitor v11.5

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

Enabling Auditing Manually

ADSelfService Plus Client Software Installation Guide

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Changing Passwords in Cisco Unity 8.x

Audit Policy Subcategories

Group Policy 21/05/2013

TROUBLESHOOTING GUIDE

Managing User and Computer Accounts

Troubleshooting Guide

ILTA HANDS ON Securing Windows 7

Project management integrated into Outlook

Project management integrated into Outlook

Setting up DCOM for Windows XP. Research

Cloud Services ADM. User Interface Guide

How to monitor AD security with MOM

June 20, Copyright 2012 by World Class CAD, LLC. All Rights Reserved.

Find the Who, What, Where and When of Your Active Directory

How to Give Admin Rights to Students on the ADGRM Domain

SafeWord Domain Login Agent Step-by-Step Guide

Install MS SQL Server 2012 Express Edition

Windows XP Exchange Client Installation Instructions

Managing Users, Computers, & Groups

Delegated Administration Quick Start

Procedure for updating Firmware of EZ4 W or ICC50 W

Next-Gen Monitoring of Active Directory. Click to edit Master title style

Configuring and Monitoring Event Logs

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server

Setting up Active Directory Domain Services

AD Certificate Distribution

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.

Password Manager Windows Desktop Client

Net Report Configuration Guide for WMI on Windows 2000 & XP

1 Backup/Restore Files

Promap V4 ActiveX MSI File

Easy way to manage add-in deployment

EventTracker: Integrating Imperva SecureSphere

DriveLock Quick Start Guide

Open a PDF document using Adobe Reader, then click on the Tools menu on the upper left hand corner.

Setting Up Peak Performance Group Policies

SELF SERVICE RESET PASSWORD MANAGEMENT BACKUP GUIDE

Learn AX: A Beginner s Guide to Microsoft Dynamics AX. Managing Users and Role Based Security in Microsoft Dynamics AX Dynamics101 ACADEMY

ContentWatch Auto Deployment Tool

Installation Guide - Client. Rev 1.5.0

Backup/Restore Individual Brick Level Backup for Microsoft Exchange Server

Table of Contents WELCOME TO ADAUDIT PLUS Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Backup/Restore Individual Brick Level Backup for Microsoft Exchange Server

AD Self Password Reset Installation and configuration

ILTA HAND 6B. Upgrading and Deploying. Windows Server In the Legal Environment

BioWin Network Installation

Active Directory Management. User Interface Guide

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

Automating client deployment

How to deploy Arkeia Network Backup v10 on Windows Server 2008 and later with a domain

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0

Sharpdesk V3.5. Push Installation Guide for system administrator Version

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Microsoft Outlook 2010

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

OrgPublisher EChart Security

Introduction. Activating the CFR Module License. CFR Configuration

Windows Logging Configuration: Audit Policy Configuration

June 2012 FORESTSAFE 4 ENTARIAN LIMITED. ForestSafe Service Configuration Adrian Owen and Jani Järvinen

Autograph 3.3 Network Installation

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installing GFI Network Server Monitor

Test Case 3 Active Directory Integration

Deployment of Keepit for Windows

Course: WIN310. Student Lab Setup Guide. Summer Microsoft Windows Server 2003 Network Infrastructure (70-291)

How To Install And Configure Windows Server 2003 On A Student Computer

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Getting Started With Delegated Administration

Setup non-admin user to query Domain Controller event log for Windows2003

Windows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII

Using Logon Agent for Transparent User Identification

Transcription:

How to Enable the Audit of Active Directory Objects in Windows 2008 R2

Windows 2008 R2 has much more and better features than its predecessors. It also wins in the native auditing part when it comes to audit the Active Directory objects. With granular control, you can easily figure out almost every change in the IT infrastructure. This also helps you to identify who ve made what change, when, and from where; but needs more in-depth investigations. In this article, we ll discuss the steps involved in enabling the audit of Active Directory Objects in Windows 2008 R2. How to Enable Global Audit Policy Follow below steps to enable the Global Audit Policy in Windows Server 2008 R2, 1. Go to Start > Administrative Tools > Group Policy Management. This will open the following window. Figure: Group Policy Management 2. In the Left Hand Panel, expand Domains > (your domain) > Domain Controllers and then click Default Domain Controllers Policy as show below. Figure: Browsing Default Domain Controllers Policy Node

3 Selecting this will display a warning message that making any changes in this policy will be global to the GPO and affect other locations. Figure: Global Policy Modification Warning 3. Read the warning and click OK button to proceed. 4. You can also check the box titled Do not show this message again, if you want. 5. Now, do a right click on the Default Domain Controllers Policy and select Edit to display the following window. Figure: Group Policy Management Editor

7. You ve to browse through Computer Configurations > Policies > Windows Settings > Security Settings > Local Policies > Audit Policy, to access the auditing policies as show herein below. Figure: Audit Policy 8. Here, you can access the following audit policies. i) Audit account logon events ii) Audit account management iii) Audit directory service access iv) Audit logon events v) Audit object access vi) Audit policy change vii) Audit privilege use viii) Audit process tracking ix) Audit system events 9. Double click Audit directory service access to display the following dialog box.

Figure: Properties of the Audit directory service access policy 10. Check Define these policy settings and then check both Success and Failure attempts. 11. Click Apply and OK button to enable the Audit directory service access auditing. 12. (Optional) In the similar way, you can enable the auditing of other available policies.

Enabling the Advanced Audit Policies 1. In the same Group Policy Management Editor, go to Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration. This contains a node titled Audit Policies, which contains the auditing policies subcategories. Figure: Advanced Audit Policy Configuration node 2. Expand the node Audit Polices to access the nodes, which are the categories of events in fact. Each category contains the advanced polices, which has to be enabled one-by-one. The categories are listed herein below: - a. Account Logon b. Account Management c. Detailed Tracking d. DS Access e. Logon/Logoff f. Object Access g. Policy Change h. Privilege Use i. System j. Global Object Access Auditing

3. All of the sub-categories inside above categories have to be enabled. Let us assume an example to enable a policy Audit Detailed File Share in the Object Access category. You ve to follow the similar steps to enable all other policies in each category one-by-one. a. Select the node Object Access Figure: Object Access node in Advanced Audit Policy Configuration b. Now, double click Audit Detailed File Share policy in the Right Hand Panel to access its Properties. Figure: Audit Detailed File Share Properties

c. Check the box titled Configure the following audit events. d. Select both the Success and Failure events. e. Click Apply and OK buttons respectively to enable this auditing. Enabling the Auditing of Objects 1. Go to the Start Menu > All Programs > Administrative Tools >Active Directory Users and Computers to access the following window. Figure: Active Directory Users and Computers 2. Go to the (your domain) > Domain Controllers and right click on the organizational unit. 3. Select Properties to display the following dialog box. Figure: OU Properties 4. Go to the Security tab.

Figure: Security Tab 5. Click Advanced button on the bottom to access the following dialog box. Figure: Advanced Security Settings

6. Switch to the Auditing tab. Figure: Auditing Tab 7. In this tab, you can select the users, on which the auditing has to be enabled, and select their events to be audited. By default, auditing for Success events is enabled on Everyone. 8. If you want to specify the auditing for a particular user, then click on Add button to display the following dialog box for adding that user. Figure: Dialog box to add a user 9. Enter the name of the user in the large textbox at the bottom and click Check Names to let the system to identify the correct name of the entered user. 10. Click OK to proceed further with the following dialog box.

Figure: Auditing Entry dialog box 11. It is suggested to select Successful and Failed for all the listed accesses. 12. Click on Apply these auditing entries to objects and/or containers within this container only to enable the auditing of all the objects/containers in the selected container. 13. Click OK button to enable the auditing. This will take you back to the same Auditing tab of Advanced Security Settings. 14. If you want to edit the auditing settings for a particular user, then select it and click Edit button. This will display the same Audit Entry dialog box and you can follow the above steps to enable the modified auditing for an existing user. 15. To reset the modified auditing settings, you can click Restore Defaults button. 16. Click Apply and OK button to apply the auditing settings. This will take you back to the Properties dialog box of the OU. 17. Click on OK button.

Performing the Audit After enabling the Active Directory auditing, all the events for the changes in Active Directory and in the selected Organizational Unit will be recorded. You can use the traditional Event Viewer to browse the events and to conduct the auditing. Third Party Tool If you face hardships to enable the auditing with too many steps and then to deal with the logged events containing difficult-to-read information, then it is advised to make of trusted third party tools for Active Directory auditing. We offer a better option than others do for this purpose. We re talking about LepideAuditor for Active Directory (LAAD). This next-gen tool has awesome features like in-depth tracking of the changes in state and values of objects, power to reinstate the states of the objects to the working states in case of any emergency, and to create long audit trails for any change. With a centralized solution to monitor all the domains at a common platform and longterm storage of logs, it lets you clearly identify the before- and after- values of each change. Conclusion You can follow the above-mentioned steps to enable the native auditing of Active Directory objects in any domain. Afterwards, you can use Event Viewer to see all the logged events for any change in the AD environment. If you face any kind of difficulty with the native auditing, then you can go for LepideAuditor for Active Directory a paid tool with extraordinary features.