Solved

Logging changes to auditing settings in AD

Posted on 2007-11-19
6
456 Views
Last Modified: 2011-10-03
Hi there,
In Windows 2003 Server, suppose I create a group policy object that enables auditing.  Now suppose another administrator changes those settings.

How specifically would I be able to track that?  If I am in the GPMC, I can go into the advanced delegation properties for the GPO in question, there is an Auditing tab there.  I have a bunch of stuff being audited now (writes and stuff), but when I change the auditing settings in the GPO itself (re: not in delegation), I don't see that change showing up in the event log.  Changing a user's password for example does show up immediately though.  Do I need to sync the DCs or something for that change to show?

Thanks!
0
Comment
Question by:schnibitz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20316785
have you enabled auditing of priviliged use and things like that....
0
 

Author Comment

by:schnibitz
ID: 20316850
Yeah, for instance:

Audit account logon events Success, Failure
Audit account management Success, Failure
Audit directory service access Success, Failure
Audit logon events Success, Failure
Audit object access Success, Failure
Audit policy change Success, Failure
Audit privilege use Success, Failure

0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 20316878
hmmm and the changes dont show up on any of the DC's at all?? it should show up on the DC that the change was made on
0
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

 

Author Comment

by:schnibitz
ID: 20316909
I do see the what's pasted in below, immediately after I make a change to the auditing settings, but it seems pretty non-specific.  I gather that a directory service object was changed, but how do I figure out which one?  Do they normally look like this?

Event Type:      Success Audit
Event Source:      Security
Event Category:      Directory Service Access
Event ID:      566
Date:            11/19/2007
Time:            5:35:12 PM
User:            DOMAIN\account
Computer:      TESTDC
Description:
Object Operation:
       Object Server:      DS
       Operation Type:      Object Access
       Object Type:      groupPolicyContainer
       Object Name:      CN={6AC1786C-016F-11D2-945F-00C04fB984F9},CN=Policies,CN=System,DC=domain,DC=in
       Handle ID:      -
       Primary User Name:      TESTDC$
       Primary Domain:      DOMAIN
       Primary Logon ID:      (0x0,0x3E7)
       Client User Name:      account
       Client Domain:      DOMAIN
       Client Logon ID:      (0x0,0x2E275)
       Accesses:      Write Property
                  
       Properties:
      Write Property
            Default property set
                  versionNumber
      groupPolicyContainer

       Additional Info:      
       Additional Info2:      
       Access Mask:      0x20


For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
0
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 500 total points
ID: 20316913
CN={6AC1786C-016F-11D2-945F-00C04fB984F9},CN=Policies,CN=System,DC=domain,DC=in

You would have to map that back to the actual object in the sysvol folder
0
 

Author Closing Comment

by:schnibitz
ID: 31410040
Good deal, thank you.
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains the steps required to use the default Photos screensaver to display branding/corporate images
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question