Documentation forAccess Rights Manager

Configure audit policies for the domain controllers (DC)

To access AD Logga functionality, activate specific audit policies.

To change your audit policy, you must be a member of the appropriate domain admin or organization admin group.

See the following sections for more information.

Configure audit policies for DCs running Windows Server 2008

Before you configure the audit policies, verify that all required categories are activated.

You can enable the required audit policies by running the following commands on every domain controller with administrator rights:

Repeat this process for all domain controllers

Monitor policy changes

auditpol /set /subcategory:{0CCE922F-69AE-11D9-BED3-505054503030} /success:enable

Directory service changes

auditpol /set /subcategory:{0CCE923C-69AE-11D9-BED3-505054503030} /success:enable

Manage user accounts

auditpol /set /subcategory:{0CCE9235-69AE-11D9-BED3-505054503030} /success:enable

Manage computer accounts

auditpol /set /subcategory:{0CCE9236-69AE-11D9-BED3-505054503030} /success:enable

Manage security groups

auditpol /set /subcategory:{0CCE9237-69AE-11D9-BED3-505054503030} /success:enable

Manage distribution groups

auditpol /set /subcategory:{0CCE9238-69AE-11D9-BED3-505054503030} /success:enable

Manage application groups

auditpol /set /subcategory:{0CCE9239-69AE-11D9-BED3-505054503030} /success:enable

Other account management events

auditpol /set /subcategory:{0CCE923A-69AE-11D9-BED3-505054503030} /success:enable

Configure audit policies for DCs running Windows Server 2008 R2 or higher

You can use the group policy editor to manage audit policy on Windows Server 2008 R2 or higher. You only need to implement the policy once, rather than having to repeat it for every domain controller

Activating the audit policy may be delayed on the domain controllers, depending on your replication interval.

Once you complete these settings, perform the following procedures:

  1. Open the Group Policy Management Console.

    Open a Run window and run the following command:

    gpmc.msc

    (Screenshot property of © 2020 Microsoft)

  2. In the Group Policy Management console, create a new group policy.

    (Screenshot property of © 2020 Microsoft)

  3. Select the organizational unit (OU) where the computer accounts are located. By default, they are located in the OU called Domain Controllers.

  4. Ensure that the new policy is applied to the appropriate domain controllers (hierarchy and order).

    The order that you set the options impacts the effectiveness of the policy. Follow the order explained here.

  5. Select the new group policy by right-clicking the policy and selecting Edit.

    (Screenshot property of © 2020 Microsoft)

  6. Enable the security policy.

    (Screenshot property of © 2020 Microsoft)

    1. Navigate to Security Options

    2. Double click the following policy:

      Audit: Force audit policy subcategory settings...

    3. Enable the security policy as shown above, and then click OK.

      The order that you set the options impacts the effectiveness of the policy. Follow the order explained here.

  7. Activate the audit.

    (Screenshot property of © 2020 Microsoft)

    1. Navigate to Account Management.

    2. Select all subcategories using multi-select, right-click, and select Properties.

    3. In the Properties for Multiple Items window, select the highlighted checkboxes, click Apply, and then click OK.

  8. Configure the audit directory service changes.

    (Screenshot property of © 2020 Microsoft)

    1. Navigate to DS Access.

    2. Under Subcategory, double-click Audit Directory Service Changes.

    3. In the Audit Directory Service Access Properties window, activate the audit as shown above.

    4. Click Apply, and then click OK.

  9. Configure the audit directory service access.

    (Screenshot property of © 2020 Microsoft)

    1. Select DS Access.

    2. Under Subcategory, double-click Audit Directory Service Access.

    3. In the Audit Directory Service Access Properties window, select the options as shown above.

    4. Click Apply, and then click OK.

  10. Configure the Audit Audit Policy Change properties.

    1. Select Policy Change.

    2. Under Subcategory, double-click Audit Audit Policy Change.

    3. In the Audit Audit Policy Change Properties window, activate the audit as show above.

    4. Click Apply, and then click OK.

  11. Manually update the policy.

    1. Open a Run window.

    2. Run the following command:

      gpupdate /force
    3. Verify the audit policy changes.

Configure the AD Logga disk space

The database requires approximately .57 MB of storage space for every 1000 events, By default, AD Logg stores all events for 30 days.

You can determine how long scan and AD Logga data are stored. This affects the size of your data base and required disk storage. See Configure storage of scan settings for instructions.

Set the size of the Windows event log

To ensure that events are not lost, configure the maximum size for the security event logs. For audit policy settings, the storage requirements are approximately 1KB per event.

Example: Collector server selected for AD Logga

A collector server outage or maintenance time of one hour with approximately 1000 events per hour, the absolute minimum security event log size would be 1MB. Considering the low storage space requirements for 1000 events and the uncertainty of outage times as well as the potential relevance of individual security events, SolarWinds recommends that you ensure adequate storage space is available.

For more information about recovery mode, see the article Set Maximum Log Size. (© 2020 Microsoft, https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc748849(v=ws.11), obtained on January 29, 2020)

Verify the audit policy settings

You can verify the effectiveness of audit policies by starting the command prompt with administrator rights and entering one of the commands listed below.

English servers

auditpol /get /category:"policy change,account management,ds access"

All languages

auditpol /get /category:*

The marked subcategories must be set to Success or Failure, as shown below.

(Screenshots property of © 2020 Microsoft)