Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

Get Quote

 
  

Audit policies are the bedrock of your IT security plans. They determine exactly what events you need to monitor, and will ultimately determine what footprints are available when you try to investigate a security incident.

We recommend that you have an audit policy strategy in place before you actually start configuring your policy settings. We've outlined a strategy for you.

Develop an audit policy strategy

Here are five things you need to do to develop an audit policy strategy:

Have a clear picture of what events are important

One thing you need to know about monitoring events is that, its extremely time - consuming. This is because a small change to a policy setting generates numerous events, most of which are 'noise'. Combing through all this noise to look for a particular event may be unnecessary, and could stop you from responding to a security incident quickly.

Therefore, you can first come up with a list of events that are important to your organization's security. You can then configure the audit policies that generate these events. This makes it easier to track suspicious activity.

Leverage group policy management

Configuring audit policies within a group policy gives you a centralized way to deploy your audit policies to entities within the domain.

Know the structure of your AD network

While configuring your audit policies in a group policy setting, it's important to know how your organization is structured. You need a clear picture of what organizational units need what security settings, and how they're logically organized. This will help you in understanding how to deploy your audit policies.

Log collection and event monitoring

Organize how you'll store, and review your logs. You can choose to store the logs on local computers, or choose to send these logs to a centralized location.

Before we jump into what audit policies you should configure, we thought we'd tell you about the benefits of having a centralized platform for your event logs.

Centralized platform for event logs

You probably already know you can use Event Viewer to view your logs. But we suggest that you opt-for a more efficient solution that helps get actionable information. There are a number of such solutions, but it goes without saying that we'd like you to give ManageEngine ADAudit Plus a try. We'll discuss how ADAudit Plus can help you keep track of all your events at the end of this article.

The reason we recommend using an efficient solution is because it speeds up the process of looking for specific events. Also, disparate events from all over the network can be correlated to have a clear picture of an incident. This improves your troubleshooting capabilities, and reduces your incident response time.

Once your audit strategy is ready, you can go ahead and configure audit policies. Now we list three recommended audit policies you should configure.

Configure event log size

Standard log sizes are already defined but you can change these settings to increase the retention period. This prevents the logs from being overwritten and you won't lose out on your audit logs.

How to do this: In the required audit policy, you can define the event log settings at Computer Configuration -> Policies -> Security Settings -> Event Log

The Microsoft Windows documentation on audit policy recommendations prescribes the following retention settings:

  • Maximum application log size - 4,194,240 (kilobytes)
  • Maximum Security log size - 4,194,240 (kilobytes)
  • Maximum system log size - 4,194,240 (kilobytes)
Configure Password policies and account lockouts

To log events for account lockouts and password failures, you'll have to configure these settings and also set a threshold.

Password Policy

How to do this: Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies -> Password Policy

  • Enforce password history - 24
  • Maximum password age - 60
  • Minimum password age - 1
  • Minimum password length - 14
  • Password must meet complexity requirements- Enabled

Account Lockout

How to do this: Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies -> Account Lockout Policy

  • Enforce password histor - 24
  • Account lockout threshold - 10
  • Reset lockout counter after - 15

Audit Policy Settings for your domain controller

How to configure these settings: Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration

Account Logon
  • Audit Credential Validation - Success and Failure
  • Audit Kerberos Authentication Services - Not configured
  • Audit Kerberos Service Ticket Operations - Not configured
  • Audit Other Account Logon Events - Not configured
Account Management
  • Audit Application Group Management - Not configured
  • Audit Computer Account Management - Success
  • Audit Distribution Group Management - Not configured
  • Audit Other Account Management Events - Success and Failure
  • Audit Security Group Management - Success and Failure
  • Audit User Account Management - Success and Failure
Detailed Tracking
  • Audit DPAPI Activity - Not configured
  • Audit Plug and Play Events - Success
  • Audit Process Creation - Success
  • Audit Process Termination - Not Configured
  • Audit RPC Events - Not Configured
  • Audit Token Right Adjected - Not Configured
DS Access
  • Audit Detailed Directory Service Replication - Not configured
  • Audit Directory Service Access - Success and Failure
  • Audit Directory Service Changes - Success and Failure
  • Audit Directory Service Replication - Not Configured
Logon/Logoff
  • Audit Account Lockout - Success and Failure
  • Audit User / Device Claims - Not configured
  • Audit Group Membership - Success
  • Audit IPsec Extended Mode - Not configured
  • Audit IPsec Main Mode - Not configured
  • Audit Logoff - Success
  • Audit Logon - Success and Failure
  • Audit Network Policy Server - Not configured
  • Audit Other Logon/Logoff Events - Not configured
  • Audit Special Logon - Success
Object Access
  • Audit Application Generated - Not configured
  • Audit Certification Services - Not configured
  • Audit Detailed File Share - Not configured
  • Audit File Share - Not configured
  • Audit File System - Not configured
  • Audit Filtering Platform Connection - Not configured
  • Audit Filtering Platform Packet Drop - Not configured
  • Audit Handle Manipulation - Not configured
  • Audit Kernel Object - Not configured
  • Audit Other Object Access Events - Not configured
  • Audit Registry - Not configured
  • Audit Removable Storage - Success and Failure
  • Audit SAM - Not configured
  • Audit Central Access Policy Staging - Not configured
Policy Change
  • Audit Audit Policy Change - Success and Failure
  • Audit Authentication Policy Change - Success
  • Audit Authorization Policy Change - Success
  • Audit Filtering Platform Policy Change - Not configured
  • Audit MPSSVC Rule-Level Policy Change - Not Configured
  • Audit Other Policy Change Events - Not configured
Privilege Use
  • Audit Non Sensitive Privilege Use - Not configured
  • Audit Other Privilege Use Events - Not configured
  • Audit Sensitive Privilege Use - Success and Failure
System
  • Audit IPsec Driver - Success and Failure
  • Audit Other System Events - Success and Failure
  • Audit Security State Change - Success
  • Audit Security System Extension - Success and Failure
  • Audit System Integrity - Success and Failure
Global Object Access Auditing
  • File System- Not configured
  • Registry- Not configured
Important events to monitor for suspicious activity :

Here's a list of important events you should monitor. We have a series of dedicated posts for each of these events. You can check out how each of these settings can be configured and how you can view these events in Event Viewer. You'll also learn how you can access a consolidated view of all your events in ADAudit Plus.

  • Successful logons – Event ID 4624
  • Failures due to bad passwords – Event ID 4625
  • Logon Failures – Event ID 4624, 4771
  • User Added to Privileged Group – Event ID 4728, 4732, 4756
  • Security enabled group modification - 4735
  • Account login with explicit credentials - 4648
How ADAudit Plus can help you monitor events?

Although Event Viewer is the default tool to check your logs, you could also try a premium solution like ADAudit Plus.

ADAudit Plus is a comprehensive solution that simplifies AD auditing and reporting. It is a one-stop platform that brings together intuitive user interface, pre-configured reports, and advanced filter options make it easy for you to track changes to your network, and detect threats immediately. You get a fully equipped dashboard that gives you a holistic view of the various systems in your network. This way you can correlate events across the network and spot suspicious behavior.

Regarding tracking events related to your audit policies, you can check out the 'GPO Settings' section that lists out various reports on changes made to audit policies. You can also try out 'GPO Management' reports to tracks modifications made to your GPO.

Image: The GPO Settings section of ADAudit Plus

Image: The 'GPO management' reports in ADAudit Plus

ADAudit Plus is a real-time, web-based Windows Active Directory (AD) change reporting software that audits, reports and alerts on Active Directory, Windows servers and workstations, and NAS storage devices to meet the demands of security, and compliance requirements. You can track AD management changes, processes, folder modifications, permissions changes, and more with 200+ reports and real-time alerts. You can also get out-of-the-box reports for compliance mandates such as the HIPAA. To learn more, visit https://www.manageengine.com/active-directory-audit/

More related links

     

Native auditing becoming a little too much?

Try ADAudit Plus login monitoring tool to audit, track, and respond to malicious login and logoff actions instantaneously.

Try ADAudit Plus for free

 

ADAudit Plus Trusted By