Solved

Logging changes to auditing settings in AD

Posted on 2007-11-19
6
454 Views
Last Modified: 2011-10-03
Hi there,
In Windows 2003 Server, suppose I create a group policy object that enables auditing.  Now suppose another administrator changes those settings.

How specifically would I be able to track that?  If I am in the GPMC, I can go into the advanced delegation properties for the GPO in question, there is an Auditing tab there.  I have a bunch of stuff being audited now (writes and stuff), but when I change the auditing settings in the GPO itself (re: not in delegation), I don't see that change showing up in the event log.  Changing a user's password for example does show up immediately though.  Do I need to sync the DCs or something for that change to show?

Thanks!
0
Comment
Question by:schnibitz
  • 3
  • 3
6 Comments
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20316785
have you enabled auditing of priviliged use and things like that....
0
 

Author Comment

by:schnibitz
ID: 20316850
Yeah, for instance:

Audit account logon events Success, Failure
Audit account management Success, Failure
Audit directory service access Success, Failure
Audit logon events Success, Failure
Audit object access Success, Failure
Audit policy change Success, Failure
Audit privilege use Success, Failure

0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20316878
hmmm and the changes dont show up on any of the DC's at all?? it should show up on the DC that the change was made on
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 

Author Comment

by:schnibitz
ID: 20316909
I do see the what's pasted in below, immediately after I make a change to the auditing settings, but it seems pretty non-specific.  I gather that a directory service object was changed, but how do I figure out which one?  Do they normally look like this?

Event Type:      Success Audit
Event Source:      Security
Event Category:      Directory Service Access
Event ID:      566
Date:            11/19/2007
Time:            5:35:12 PM
User:            DOMAIN\account
Computer:      TESTDC
Description:
Object Operation:
       Object Server:      DS
       Operation Type:      Object Access
       Object Type:      groupPolicyContainer
       Object Name:      CN={6AC1786C-016F-11D2-945F-00C04fB984F9},CN=Policies,CN=System,DC=domain,DC=in
       Handle ID:      -
       Primary User Name:      TESTDC$
       Primary Domain:      DOMAIN
       Primary Logon ID:      (0x0,0x3E7)
       Client User Name:      account
       Client Domain:      DOMAIN
       Client Logon ID:      (0x0,0x2E275)
       Accesses:      Write Property
                  
       Properties:
      Write Property
            Default property set
                  versionNumber
      groupPolicyContainer

       Additional Info:      
       Additional Info2:      
       Access Mask:      0x20


For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
0
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 500 total points
ID: 20316913
CN={6AC1786C-016F-11D2-945F-00C04fB984F9},CN=Policies,CN=System,DC=domain,DC=in

You would have to map that back to the actual object in the sysvol folder
0
 

Author Closing Comment

by:schnibitz
ID: 31410040
Good deal, thank you.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question