?
Solved

Securing Group Policy from unauthorized changes

Posted on 2011-09-22
2
Medium Priority
?
265 Views
Last Modified: 2012-05-12
Good afternoon everyone,

I work in a mid size company where there are two of us that have full domain administrative rights.  My counterpart as he is refered to has no experience with network administration, no training, no certifications and likes to just jump in and see what happens by changing settings.

THe problem is I am tired of trying to figure out what has been changed, why and why wasn't I told.  And, like most situations with rogue admins they claim the ole 'I didn't change anything!'.

So what I need to find is a way to lock this person out of the group policy settings and or to have a log or notification that a policy has been modified.  Is there an easy way to do this without buying hardware or software?

thanks
ME
0
Comment
Question by:newmanme
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 2000 total points
ID: 36583470
You can enable auditing and then use event triggers to send you notifications

event 566 in 2003 It is 566 for 2003, see this question I helped with   http://www.experts-exchange.com/Software/Server_Software/File_Servers/Active_Directory/Q_24534479.html

corresponding to 566 in 2008   http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=566

More on forwarding the event here  http://portal.sivarajan.com/2010/04/generate-email-alert-to-event-attach.html

The ultimate answer is to train him up or take away admin rights.

Thanks

Mike
0
 
LVL 24

Expert Comment

by:Sandeshdubey
ID: 36585041
As you have mentioned that you both are having admin rights and if you both are using the same admin userid then create seperate domain admin id account for each  and configure audit Active Diretory object to keep track of users which are given rights to perform certain activities on AD.
Reference KB article:http://support.microsoft.com/kb/814595
http://technet.microsoft.com/en-us/library/cc731607(WS.10).aspx

Event id 566 will be logged if GP is change see sample log in the link provide below.
http://blogs.msdn.com/b/ericfitz/archive/2005/08/04/447951.aspx

Note:Active Directory audit logs can show you who made changes to what object attributes if it si not enabled the events will not be logged.



0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question