Advanced Security Audit Policy Step-By-Step Guide
Advanced Security Audit Policy Step-By-Step Guide
A group administrator has modified settings or data on servers that contain finance information.
The correct system access control list (SACL) is applied to every file and folder or registry key on a
computer or file share as a verifiable safeguard against undetected access.
In Windows 7 and Windows Server 2008 R2, the number of audit settings for which success and failure
can be tracked has increased to 53. Previously, there were nine basic auditing settings under Computer
Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy. These
53 new settings allow you to select only the behaviors that you want to monitor and exclude audit results
for behaviors that are of little or no concern to you, or behaviors that create an excessive number of log
entries. In addition, because Windows 7 and Windows Server 2008 R2 security audit policy can be applied
by using domain Group Policy, audit policy settings can be modified, tested, and deployed to selected
users and groups with relative simplicity.
This step-by-step guide demonstrates the process of setting up an advanced Windows 7 and Windows
Server 2008 R2 security auditing policy infrastructure in a test environment. It also guides you through
the process of configuring some representative advanced security audit policy settings. When you have
completed these initial tasks, you are strongly encouraged to use the procedures in this guide to choose,
configure, apply, and assess additional security audit policy settings.
During this process, you will create an Active Directory domain, install Windows Server 2008 R2 on a
member server, install Windows 7 on a client computer, and configure new advanced security audit policy
settings, including global object access auditing. In addition, this document will walk you through the
examination of new "reason for access" data available by using a number of new audit policy settings.
Once complete, you can use this test environment to apply different sets of Windows Server 2008 R2
advanced security audit policy settings and assess how they might be used to enhance security in your
organization.
As you complete the steps in this guide, you will be able to:
Create and apply advanced audit policy settings to a defined group of computers in your
organization.
Verify that the audit policy settings are applied to a defined group of client computer in your
organization.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 1/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
Use new "reason for access" security event data to identify the permissions that were used to
determine whether a particular security event was triggered.
Configure, apply, and analyze the impact of different audit policy settings to identify the settings
that are important to your organization.
Important
We recommend that you first use the procedures in this guide in a test lab environment. Step-by-step
guides are not meant to be used to deploy Windows features without additional deployment planning
and documentation.
The test environment described in this guide includes three computers that are connected to a private
network and use the following operating systems, applications, and services.
Computer
Operating system Applications and services
name
Note
CONTOSO- Windows 7
CLNT
Note
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 2/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
client computer.
Note
For more information about operating system compatibility and requirements, see Which Versions of
Windows Support Advanced Audit Policy Configuration?.
The computers form a private intranet and are connected through a common hub or Layer 2 switch. This
configuration can be emulated in a virtual machine environment if desired. This step-by-step uses private
addresses throughout the test lab configuration. The private network ID 10.0.0.0/24 is used for the
intranet. The domain controller for the domain named contoso.com is named CONTOSO-DC. The following
figure shows the configuration of the test environment.
Step 3: Creating and verifying an audit policy that provides the reason for object access
Optional section: Roll back security audit policy from Advanced Audit Policy to basic audit policy
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 3/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
Use the following table as a reference when setting up the appropriate computer names, operating
systems, and network settings that are required to complete the steps in this guide.
Important
Before you configure your computers with static IP addresses, we recommend that you first complete
two important tasks that require Internet connectivity: Complete Windows product activation and use
Windows Update to obtain and install any available critical security updates.
Computer
Operating system requirement IP settings DNS settings
name
CONTOSO- Windows Server 2008 R2, Windows Server 2008, or IP address: Configured by
DC Windows Server 2003 with Service Pack 2 (SP2) 10.0.0.1 DNS server
role
Subnet mask:
255.255.255.0
Subnet mask:
255.255.255.0
Subnet mask:
255.255.255.0
Note
For more information about operating system requirements, see What's New in Windows Security
Auditing.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 4/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
To configure the domain controller CONTOSO-DC running Windows Server 2008 R2, you must:
Install AD DS.
1. Start your computer by using the Windows Server 2008 R2 product CD.
3. Follow the rest of the instructions that appear on your screen to finish the installation.
Next, configure TCP/IP properties so that CONTOSO-DC has an IPv4 static IP address of 10.0.0.1.
2. Click Start, click Control Panel, click Network and Internet, click Network and Sharing
Center, click Change Adapter Settings, right-click Local Area Connection, and then click
Properties.
3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties.
4. Click Use the following IP address. In the IP address box, type 10.0.0.1. In the Subnet
mask box, type 255.255.255.0. In the Default gateway box, type 10.0.0.1.
5. In the Preferred DNS server box, type 10.0.0.1, and then click OK.
6. On the Networking tab, clear the Internet Protocol Version 6 (TCP/IPv6) check box, and
then click Close.
Next, configure the computer as a domain controller running Windows Server 2008 R2.
1. Click Start, and then click Run. In the Open box, type dcpromo, and then click OK.
2. On the Welcome to the Active Directory Domain Services Installation Wizard page, click
Next, and then click Next again.
3. Click Create a new domain in a new forest, and then click Next.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 5/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
4. In the FQDN of the forest root domain box, type contoso.com, and then click Next.
5. Leave the default value in the Domain NetBIOS name box, and then click Next.
6. In the Forest functional level list, click Windows Server 2003, and then click Next.
7. In the Domain functional level list, click Windows Server 2003, and then click Next.
8. Ensure that the DNS server check box is selected, and then click Next.
9. Click Yes, confirming that you want to create a delegation for this DNS server.
10. On the Location for Database, Log Files, and SYSVOL page, click Next.
11. In the Password and Confirm password boxes, type a strong password, and then click Next.
13. When the installation is complete, click Finish, and then click Restart Now.
Note
You must restart the computer after you complete this procedure.
2. Click Start, click Control Panel, double-click Administrative Tools, and then double-click
Active Directory Users and Computers.
3. In the console tree, right-click contoso.com, point to New, and then click Organizational
Unit.
4. Type the name of the new OU, Finance, and then click OK.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 6/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
1. Start your computer by using the Windows Server 2008 R2 product CD.
3. Follow the rest of the instructions that appear on your screen to finish the installation.
Next, configure TCP/IP properties so that CONTOSO-SRV has a static IP address of 10.0.0.2. In
addition, configure the DNS server by using the IP address of CONTOSO-DC (10.0.0.1).
2. Click Start, click Control Panel, double-click Network and Sharing Center, click Manage
Network Connections, right-click Local Area Connection, and then click Properties.
3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties.
4. Click Use the following IP address. In the IP address box, type 10.0.0.2. In the Subnet
mask box, type 255.255.255.0. In the Default gateway box, type 10.0.0.1.
5. Click Use the following DNS server addresses. In Preferred DNS server, type 10.0.0.1.
6. Click OK, and then click Close to close the Local Area Connection Properties dialog box.
2. Click Change settings (on the right under Computer name, domain, and workgroup
settings), and then click Change.
3. In the Computer Name/Domain Changes dialog box, click Domain, and then type
contoso.com.
4. Click More, and in the Primary DNS suffix of this computer box, type contoso.com.
6. When a Computer Name/Domain Changes dialog box appears prompting you for
administrative credentials, provide the credentials for CONTOSO\Administrator, and then click
OK.
7. When a Computer Name/Domain Changes dialog box appears welcoming you to the
contoso.com domain, click OK.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 7/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
8. When a Computer Name/Domain Changes dialog box appears telling you that the computer
must be restarted, click OK, and then click Close.
After the computer has restarted, add CONTOSO-SRV to the Finance OU.
2. Click Start, click Control Panel, double-click Administrative Tools, and then double-click
Active Directory Users and Computers.
4. In the console tree, right-click the Finance OU, point to New, and then click Group.
5. Type the name of the new group, Computers, and then in Group scope, click Domain local,
and in Group type, click Security group.
6. Right-click Computers, and then click Properties. On the Members tab, click Add.
7. In Enter the object names to select, type CONTOSO-SRV, and then click OK.
Finally, install the GPMC on CONTOSO-SRV by using Server Manager. This will be used to configure the
advanced security audit policy settings.
2. Click Start, point to Administrative Tools, and then click Server Manager.
4. Select the Group Policy Management check box, and then click Install.
Install Windows 7.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 8/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
To install Windows 7
2. Follow the instructions that appear on your screen, and when prompted for a computer name,
type CONTOSO-CLNT.
Next, configure TCP/IP properties so that CONTOSO-CLNT has a static IP address of 10.0.0.3. In
addition, configure the DNS server of CONTOSO-DC (10.0.0.1).
2. Click Start, click Control Panel, click Network and Internet, and then click Network and
Sharing Center.
3. Click Change adapter settings, right-click Local Area Connection, and then click
Properties.
4. If the User Account Control dialog box appears, confirm that the action it displays is what you
want, and then click Yes.
5. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties.
6. Click Use the following IP address. In IP address, type 10.0.0.3. In Subnet mask, type
255.255.255.0.
7. Click Use the following DNS server addresses. In Preferred DNS server, type 10.0.0.1.
8. Click OK, and then click Close to close the Local Area Connection Properties dialog box.
2. Under Computer name, domain, and workgroup settings, click Change settings.
3. If the User Account Control dialog box appears, confirm that the action it displays is what you
want, and then click Yes.
5. In the Computer Name/Domain Changes dialog box, click Domain, and then type
contoso.com.
6. Click More, and in the Primary DNS suffix of this computer box, type contoso.com.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 9/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
8. When a Computer Name/Domain Changes dialog box appears prompting you for
administrative credentials, provide the credentials, and then click OK.
9. When a Computer Name/Domain Changes dialog box appears welcoming you to the
contoso.com domain, click OK.
10. When a Computer Name/Domain Changes dialog box appears telling you that the computer
must be restarted, click OK, and then click Close.
11. In the System Settings Change dialog box, click Yes to restart the computer.
In Windows Server 2008 R2 and Windows 7, administrators can audit more specific aspects of client
behavior on the computer or network, thus making it easier to identify the behaviors that are of greatest
interest. For example, in Computer Configuration\Policies\Windows Settings\Security
Settings\Local Policies\Audit Policy, there is only one policy setting for logon events, Audit logon
events. In Computer Configuration\Policies\Windows Settings\Security Settings\Advanced
Audit Policy Configuration\System Audit Policies, you can instead choose from eight different policy
settings in the Logon/Logoff category. This provides you with more detailed control of what aspects of
logon and logoff you can track.
A default domain policy is automatically generated when a new domain is created. In this section, we will
edit the default domain policy and add an advanced security audit policy setting that audits when a user
either successfully or unsuccessfully logs on to a computer in the CONTOSO domain.
To configure, apply, and validate an advanced domain logon audit policy setting, you must:
Ensure that Advanced Audit Policy Configuration settings are not overwritten.
Verify that the advanced logon security audit policy settings were applied correctly.
2. Click Start, point to Administrative Tools, and then click Group Policy Management.
3. In the console tree, double-click Forest: contoso.com, double-click Domains, and then double-
click contoso.com.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 10/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
6. Double-click Security Settings, double-click Advanced Audit Policy Configuration, and then
double-click System Audit Policies.
8. Select the Configure the following audit events check box, select the Success check box,
select the Failure check box, and then click OK.
When you use Advanced Audit Policy Configuration settings, you need to confirm that these settings are
not overwritten by basic audit policy settings. The following procedure shows how to prevent conflicts by
blocking the application of any basic audit policy settings.
To ensure that Advanced Audit Policy Configuration settings are not overwritten
1. On CONTOSO-SRV, click Start, point to Administrative Tools, and then click Group Policy
Management.
2. In the console tree, double-click Forest: contoso.com, double-click Domains, and then double-
click contoso.com.
6. Double-click Audit: Force audit policy subcategory settings (Windows Vista or later) to
override audit policy category settings, and then click Define this policy setting.
Before you can verify the functionality of advanced security audit policy settings in the contoso.com
domain, you will log on to CONTOSO-CLNT as the domain administrator of the contoso.com domain and
ensure that the Group Policy settings have been applied.
2. Click Start, point to All Programs, click Accessories, right-click Command Prompt, and then
click Run as administrator.
3. If the User Account Control dialog box appears, confirm that the action it displays is what you
want, and then click Yes.
After the Group Policy settings have been applied, you can verify that the audit policy settings were
applied correctly.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 11/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
To verify that the advanced logon security audit policy settings were applied correctly
2. Click Start, point to All Programs, click Accessories, right-click Command Prompt, and then
click Run as administrator.
3. If the User Account Control dialog box appears, confirm that the action it displays is what you
want, and then click Yes.
5. Verify that Success, Failure, or Success and Failure are shown to the right of Logon.
To configure, apply, and validate a reason for object access policy, you must:
Ensure that Advanced Audit Policy Configuration settings are not overwritten.
2. Click Start, point to Administrative Tools, and then click Group Policy Management.
3. In the console tree, double-click Forest: contoso.com, double-click Domains, and then double-
click contoso.com.
6. Double-click Security Settings, double-click Advanced Audit Policy Configuration, and then
double-click System Audit Policies.
8. Select the Configure the following events check box, and then select the Success, Failure, or
both Success and Failure check boxes.
9. Click OK.
The file system audit policy is only used to monitor objects for which auditing SACLs have been
configured. The following procedure shows how to configure auditing for a file or folder.
3. Right-click the new object, click Properties, and click the Security tab.
5. If the User Account Control dialog box appears, confirm that the action it displays is what you
want, and then click Yes.
6. Click Add, type a user name or computer name in the format contoso\user1, and then click OK.
7. In the Auditing Entries for dialog box, select the permissions that you want to audit, such as
Full Control or Delete.
In Windows 7 and Windows Server 2008 R2, the reason why someone has been granted or denied access
is added to the open handle event. This makes it possible for administrators to understand why someone
was able to open a file, folder, or file share for a specific access. To enable this functionality, the handle
manipulation audit policy also needs to be enabled so that success events record access attempts that
were allowed and failure events record access attempts that were denied.
2. Click Start, point to Administrative Tools, and then click Group Policy Management.
3. In the console tree, double-click Forest: contoso.com, double-click Domains, and then double-
click contoso.com.
4. Double-click the Finance OU, right-click Finance Audit Policy, and click Edit.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 13/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
6. Double-click Security Settings, double-click Advanced Audit Policy Configuration, and then
double-click System Audit Policies.
8. Select the Configure the following audit events check box, select the Success and Failure
check boxes, and then click OK.
After you have created this audit policy, confirm that these advanced audit policy settings cannot be
overwritten. For more information, see the "To ensure that Advanced Audit Policy Configuration settings
are not overwritten" procedure in the Step 2: Creating and verifying an advanced audit policy section.
Then apply the Group Policy updates by using the "To update Group Policy settings" procedure in the Step
2: Creating and verifying an advanced audit policy section.
After the updated Group Policy settings have been applied, be sure to log on to and log off from
CONTOSO-CLNT and complete some tasks that will generate reason for object access events. Once you
have completed these steps, you can review the auditing data that provides the reason for access.
1. On CONTOSO-CLNT, click Start, point to Administrative Tools, and then click Event Viewer.
4. Find the file or folder that you configured in the domain-level object access procedure, and modify
the file or folder by using the permissions that you configured for the user account.
6. In the Event ID column, click the event or events titled 4656, scroll down to the Access
Request Information section, and confirm the permissions that were used to perform the task.
In this case, you will be auditing any changes made to registry keys by members of a specified group
rather than changes made to file system objects.
To configure, apply, and validate a global object access audit policy, you must:
Ensure that Advanced Audit Policy Configuration settings are not overwritten.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 14/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
2. Click Start, point to Administrative Tools, and then click Group Policy Management.
3. In the console tree, double-click Forest: contoso.com, double-click Domains, and then double-
click contoso.com.
6. Double-click Security Settings, double-click Advanced Audit Policy Configuration, and then
double-click System Audit Policies.
8. Select the Configure the following events check box, select the Success and Failure check
boxes, and then click OK.
10. Select the Define this policy setting check box, and click Configure.
11. In the Advanced Security Settings for Registry SACL box, click Add.
12. Type a user name or computer name in the format contoso\user1, [email protected], or
CONTOSO-CLNT, and click OK.
13. In the Auditing Entry for Global Registry SACL box, select the Successful or Failed activities
for which you want to log audit entriesfor example, Create Subkey, Delete, or Read.
After you have created the audit policy, confirm that these advanced audit policy settings cannot be
overwritten. For more information, see the "To ensure that Advanced Audit Policy Configuration settings
are not overwritten" procedure in the Step 2: Creating and verifying an advanced audit policy section.
Then apply the Group Policy updates by using the "To update Group Policy settings" procedure in the Step
2: Creating and verifying an advanced audit policy section. After the updated Group Policy settings have
been applied, log on to and log off from CONTOSO-CLNT.
To verify that the global object access policy has been applied
1. Open Registry Editor, and create and modify one or more registry settings.
3. Open Event Viewer, and confirm that your activities resulted in audit events, even though you did
not set explicit auditing SACLs on the registry settings that you created, modified, and deleted.
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 15/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
To identify additional settings of potential interest to your organization, review the information in What's
New in Windows Security Auditing.
As you apply and test additional settings, consider how the audit event data that is generated can help
you create a more secure network. In particular, consider the following:
How can I adjust these audit policy settings to get only the information that I need?
Security auditing is a critical and essential tool to help you ensure that your network assets are secure.
You should spend as much time as necessary to explore and understand the new advanced security audit
policy settings in Windows 7 and Windows Server 2008 R2.
Where available, configure the advanced security permissions on the object being audited so that
the audit policy applies only to a specific group. For example, if you want the Object Access policy
setting to apply to a file or folder, you can configure permissions on the file or folder so that object
access is only tracked for the individuals or groups you specify. The procedure titled "To enable
auditing for a file or folder" earlier in this document describes how to complete this task.
Define and deploy per-user audit settings by using an audit policy text file, a logon script, and the
Auditpol.exe command-line tool.
Important
Per-user auditing based on logon scripts can only be applied to individual users, not groups. You
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 16/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
cannot use logon scripts to exclude subcategories or categories of audit policy settings for
administrators.
The following procedure describes how to create an audit policy text file that can be deployed by using a
logon script. For more information about using logon scripts to deploy an audit policy, see article 921469
in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkID=82447).
Note
To obtain a list of possible audit settings in report format, open a Command Prompt window,
type auditpol /list /subcategory:* /r, and press ENTER. For more information about using
Auditpol, see Auditpol set and Auditpol list.
3. Format your policy by opening auditpolicyfilename.txt and removing all lines except the first line
of text and the per-user audit lines of text.
Note
4. When you have finished creating your file, on the File menu, click Save As, and confirm that
ANSI is selected in the Encoding list. Click OK.
5. At a command prompt, type auditpol /restore /file: auditpolicyfilename.txt, and press ENTER
to confirm that the desired audit settings are configured. Type auditpol /list /user, and press
ENTER to list any users with per-user audit settings.
6. Copy the auditpolicyfilename.txt file to the Netlogon share of the domain controller that holds the
primary domain controller (PDC) emulator role in the domain.
Important
Do not import audit policies containing per-user auditing settings directly into a Group Policy
object (GPO). When per-user audit settings are deployed through Group Policy and not through
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 17/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
logon scripts as described in this procedure, this can cause unexpected levels of failure events
to appear in your security audit logs.
2. Delete all audit.csv files from the %SYSVOL% folder on the domain controller.
Unless you complete all of these steps, the basic audit policy settings will not be restored.
Community Additions
M-Reza Kashipaz
9/15/2015
ShaunySean
12/4/2012
What I ment is, that the procedure in step 2 step 6 points to a location that isn't there. In stead you should go to ;
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 18/19
12/7/2017 Advanced Security Audit Policy Step-by-Step Guide
and there alter the properties of "Audit: force audit policy subcategory settings (Windows Vista or Later) to override
audit policy category settings"....
Thomas Lee
11/23/2011
2017 Microsoft
https://technet.microsoft.com/en-us/library/df0e28a2-1332-4422-bc88-d700fcba8c78 19/19