Audit - Policy - Best - Practices - Security Logs On Windows Servers
Audit - Policy - Best - Practices - Security Logs On Windows Servers
Best Practices
What is audit policy?
Windows audit policy defines what types of events are written in the Security logs of your Windows servers.
Establishing an effective audit policy is an important aspect of IT security. Monitoring the creation or
modification of objects helps you spot potential security problems, ensure user accountability and provide
evidence in the event of a security breach. The recommended settings provided are intended as a baseline
for system administrators starting to define AD audit policies.
Remember that audit settings can affect computer performance. Therefore, you should perform
performance tests before you deploy new audit settings in your production environment.
A final consideration is the amount of storage space that you can allocate to storing the data collected
by auditing. Depending on the setting you choose, audit data can quickly fill up available disk space.
Specify the maximum size and other attributes of the Security log using the Event Logging policy
settings. You can view the Security log with Event Viewer.
If you want to audit directory service access or object access, configure the Audit directory service
access and Audit object access policy settings.
2
Types of events you can audit
Account logon. User logon auditing is the only way to detect all unauthorized attempts to log in to a
domain. It is necessary to audit logon events — both successful and failed — to detect intrusion
attempts . Logoff events are not tracked on the domain controllers.
Account management. Carefully monitoring all user account changes helps minimize the risk of
business disruption and system unavailability.
Directory service access. Monitor this only when you need to see when someone accesses an AD
object that has its own system access control list (for example, an OU).
Logon. Seeing successful and failed attempts to log on or off a local computer is useful for intruder
detection and post-incident forensics.
Object access. Audit this only when you need to see when someone used privileges to access, copy,
distribute, modify or delete files on file servers.
Policy change. Improper changes to a GPO can greatly damage the security of your environment.
Monitor all GPO modifications to reduce the risk of data exposure.
Privilege use. Turn this on only when you want to track each instance of user privileges being used.
Process tracking. Auditing process-related events, such as process creation, process termination,
handle duplication and indirect object access, can be useful for incident investigations.
System. Configuring the system audit policy to log startups and shutdowns or restarts of the computer,
and attempts by a process or program to do something that it does not have permission to do, is
valuable because all such events are very significant. For example, if malicious software tries to change
a setting on your computer without your permission, system event auditing would record that action.
3
Recommended Audit Policy settings
Account logon
Account management
Logon
Object access
Enable this setting only if you have a specific use for the data that will be logged, because it can cause
a large volume of entries to be generated in your Security logs.
Policy Change
4
Privilege use
Enable this setting only if you have a specific use for the data that will be logged, because it can cause
a large volume of entries to be generated in your Security logs.
Process tracking
Enable this setting only if you have a specific use for the data that will be logged, because it can cause
a large volume of entries to be generated in your Security logs.
System
About Netwrix
Netwrix Corporation is a software company focused exclusively on providing IT security and operations
teams with pervasive visibility into user behavior, system configurations and data sensitivity across hybrid IT
infrastructures to protect data regardless of its location. Over 9,000 organizations worldwide rely on Netwrix
to detect and proactively mitigate data security threats, pass compliance audits with less effort and expense,
and increase the productivity of their IT teams.
Founded in 2006, Netwrix has earned more than 140 industry awards and been named to both the Inc. 5000
and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.
5
Keep Tabs on What’s Happening
in Your IT Environment
with Netwrix Auditor