• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 464
  • Last Modified:

Logging changes to auditing settings in AD

Hi there,
In Windows 2003 Server, suppose I create a group policy object that enables auditing.  Now suppose another administrator changes those settings.

How specifically would I be able to track that?  If I am in the GPMC, I can go into the advanced delegation properties for the GPO in question, there is an Auditing tab there.  I have a bunch of stuff being audited now (writes and stuff), but when I change the auditing settings in the GPO itself (re: not in delegation), I don't see that change showing up in the event log.  Changing a user's password for example does show up immediately though.  Do I need to sync the DCs or something for that change to show?

Thanks!
0
schnibitz
Asked:
schnibitz
  • 3
  • 3
1 Solution
 
Jay_Jay70Commented:
have you enabled auditing of priviliged use and things like that....
0
 
schnibitzAuthor Commented:
Yeah, for instance:

Audit account logon events Success, Failure
Audit account management Success, Failure
Audit directory service access Success, Failure
Audit logon events Success, Failure
Audit object access Success, Failure
Audit policy change Success, Failure
Audit privilege use Success, Failure

0
 
Jay_Jay70Commented:
hmmm and the changes dont show up on any of the DC's at all?? it should show up on the DC that the change was made on
0
Free tool for managing users' photos in Office 365

Easily upload multiple users’ photos to Office 365. Manage them with an intuitive GUI and use handy built-in cropping and resizing options. Link photos with users based on Azure AD attributes. Free tool!

 
schnibitzAuthor Commented:
I do see the what's pasted in below, immediately after I make a change to the auditing settings, but it seems pretty non-specific.  I gather that a directory service object was changed, but how do I figure out which one?  Do they normally look like this?

Event Type:      Success Audit
Event Source:      Security
Event Category:      Directory Service Access
Event ID:      566
Date:            11/19/2007
Time:            5:35:12 PM
User:            DOMAIN\account
Computer:      TESTDC
Description:
Object Operation:
       Object Server:      DS
       Operation Type:      Object Access
       Object Type:      groupPolicyContainer
       Object Name:      CN={6AC1786C-016F-11D2-945F-00C04fB984F9},CN=Policies,CN=System,DC=domain,DC=in
       Handle ID:      -
       Primary User Name:      TESTDC$
       Primary Domain:      DOMAIN
       Primary Logon ID:      (0x0,0x3E7)
       Client User Name:      account
       Client Domain:      DOMAIN
       Client Logon ID:      (0x0,0x2E275)
       Accesses:      Write Property
                  
       Properties:
      Write Property
            Default property set
                  versionNumber
      groupPolicyContainer

       Additional Info:      
       Additional Info2:      
       Access Mask:      0x20


For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
0
 
Jay_Jay70Commented:
CN={6AC1786C-016F-11D2-945F-00C04fB984F9},CN=Policies,CN=System,DC=domain,DC=in

You would have to map that back to the actual object in the sysvol folder
0
 
schnibitzAuthor Commented:
Good deal, thank you.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now