You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/configure-windows-event-collection.md
+33-79Lines changed: 33 additions & 79 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,58 +9,44 @@ ms.reviewer: rlitinsky
9
9
# Configure audit policies for Windows event logs
10
10
11
11
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
12
-
This article describes how to optimally configure the Advanced Audit Policy settings on your domain controllers to avoid gaps in the event logs and incomplete Defender for Identity coverage.
12
+
This article describes how to configure the advanced audit policy settings to avoid gaps in the event logs and incomplete Defender for Identity coverage.
13
13
14
-
## Configure Windows event auditing with the Defender for Identity sensor v3.x
15
-
16
-
Defender for Identity sensor v3.x offers preview feature that allows automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones.
17
-
18
-
To turn on automatic windows auditing:
19
-
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings**, and then **Identities**.
20
-
1. In the **General** section, select **Advanced features**.
21
-
1. Turn on **Automatic Windows auditing configuration**.
22
-
23
-
If you do not select automatic Windows auditing configuration, you must manually configure Windows event auditing in the Defender portal or using PowerShell.
24
-
25
-
## Configure Windows event auditing with the Defender for Identity sensor v2.x
26
-
27
-
Configure Windows event auditing on your domain controllers to support Defender for Identity detections.
28
-
Defender for Identity generates health issues for each of these scenarios if they're detected. For more information, see [Microsoft Defender for Identity health issues](../health-alerts.md).
14
+
Defender for Identity generates health alerts when it detects incorrect windows event auditing configurations. For more information, see [Microsoft Defender for Identity health alerts](../health-alerts.md).
29
15
30
16
## Prerequisites
31
17
32
-
- Before you run Defender for Identity PowerShell commands, make sure that you download the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
18
+
If you are using the Active Directory PowerShell module to configure a domain controller, make sure that you download the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
19
+
33
20
> [!NOTE]
34
-
> The Active Directory PowerShell module is required when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
21
+
> The Active Directory PowerShell module is only required when configuring Defender for Identity on domain controllers. It isn’t required on AD CS servers running the Certification Authority Role Service.
35
22
36
-
## Generate a report of current configurations via PowerShell
23
+
## Generate a report of current configurations using PowerShell
37
24
38
25
Before you start creating new event and audit policies, we recommend that you run the following PowerShell command to generate a report of your current domain configurations:
> When using `-Mode Domain`, include the `-Identity` parameter to avoid an interactive prompt.
46
-
> For more information, see: [New-MDIConfigurationReport](/powershell/module/defenderforidentity/new-mdiconfigurationreport?view=defenderforidentity-latest&preserve-view=true).
47
-
48
-
In the preceding command:
30
+
Where:
49
31
50
32
-`Path` specifies the path to save the reports to.
51
33
-`Mode` specifies whether you want to use `Domain` or `LocalMachine` mode. In `Domain` mode, the settings are collected from the Group Policy objects (GPOs). In `LocalMachine` mode, the settings are collected from the local machine.
34
+
35
+
The `Domain` mode report includes only configurations set as group policies on the domain. If you have settings defined locally on your domain controllers, we recommend that you also run the [Test-MdiReadiness.ps1](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script.
36
+
52
37
-`OpenHtmlReport` opens the HTML report after the report is generated.
53
38
39
+
> [!NOTE]
40
+
> When using `-Mode Domain`, include the `-Identity` parameter to avoid an interactive prompt.
41
+
> For more information, see: [New-MDIConfigurationReport](/powershell/module/defenderforidentity/new-mdiconfigurationreport?view=defenderforidentity-latest&preserve-view=true).
42
+
54
43
For example, to generate a report and open it in your default browser, run the following command:
For more information, see the [DefenderforIdentity PowerShell reference](/powershell/module/defenderforidentity/new-mdiconfigurationreport).
61
-
62
-
> [!TIP]
63
-
> The `Domain` mode report includes only configurations set as group policies on the domain. If you have settings defined locally on your domain controllers, we recommend that you also run the [Test-MdiReadiness.ps1](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script.
49
+
For more information, see the [Defender for Identity PowerShell reference](/powershell/module/defenderforidentity/new-mdiconfigurationreport).
64
50
65
51
## Configure Windows event auditing for domain controllers
66
52
@@ -72,16 +58,12 @@ Update your Advanced Audit Policy settings and extra configurations for specific
72
58
73
59
For more information, see [Advanced security auditing FAQ](/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/advanced-security-auditing-faq).
74
60
75
-
Use the following procedures to configure auditing on the domain controllers that you're using with Defender for Identity.
61
+
You can configure auditing on the domain controllers either in the portal or using PowerShell.
76
62
77
-
### Configure Advanced Audit Policy settings from the UI
63
+
### Configure Advanced Audit Policy settings in the Defender portal
78
64
79
65
This procedure describes how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity via the UI.
80
66
81
-
**Related health issue:**[Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
82
-
83
-
To configure your Advanced Audit Policy settings:
84
-
85
67
1. Sign in to the server as **Domain Administrator**.
86
68
1. Open the Group Policy Management Editor from **Server Manager** > **Tools** > **Group Policy Management**.
87
69
1. Expand **Domain Controllers Organizational Units**, right-click **Default Domain Controllers Policy**, and then select **Edit**.
@@ -118,7 +100,6 @@ To configure your Advanced Audit Policy settings:
118
100

119
101
120
102
1. From an elevated command prompt, enter `gpupdate`.
121
-
122
103
1. After you apply the policy via GPO, confirm that the new events appear in the Event Viewer, under **Windows Logs** > **Security**.
123
104
124
105
To test your audit policies from the command line, run the following command:
@@ -129,12 +110,10 @@ To configure your Advanced Audit Policy settings:
129
110
130
111
For more information, see the [auditpol reference documentation](/windows-server/administration/windows-commands/auditpol).
131
112
132
-
### Configure Advanced Audit Policy settings by using PowerShell
113
+
### Configure Advanced Audit Policy settings using PowerShell
133
114
134
115
The following actions describe how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity by using PowerShell.
135
116
136
-
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
137
-
138
117
The following command defines all settings for the domain, creates group policy objects, and links them.
139
118
140
119
```powershell
@@ -147,7 +126,7 @@ To configure your settings, run:
-`Mode` specifies whether you want to use `Domain` or `LocalMachine` mode. In `Domain` mode, the settings are collected from the Group Policy objects. In `LocalMachine` mode, the settings are collected from the local machine.
153
132
-`Configuration` specifies which configuration to set. Use `All` to set all configurations.
@@ -161,7 +140,7 @@ To view your audit policies, use the `Get-MDIConfiguration` command to show curr
-`Mode` specifies whether you want to use `Domain` or `LocalMachine` mode. In `Domain` mode, the settings are collected from the Group Policy objects. In `LocalMachine` mode, the settings are collected from the local machine.
167
146
-`Configuration` specifies which configuration to get. Use `All` to get all configurations.
@@ -172,7 +151,7 @@ To test your audit policies, use the `Test-MDIConfiguration` command to get a `t
-`Mode` specifies whether you want to use `Domain` or `LocalMachine` mode. In `Domain` mode, the settings are collected from the Group Policy objects. In `LocalMachine` mode, the settings are collected from the local machine.
178
157
-`Configuration` specifies which configuration to test. Use `All` to test all configurations.
@@ -183,20 +162,16 @@ For more information, see the following [DefenderForIdentity PowerShell referenc
This section describes the extra configuration steps that you need for auditing Windows event 8004.
167
+
When a Defender for Identity sensor parses Windows event 8004, Defender for Identity NTLM authentication activities are enriched with the server-accessed data. This section describes the extra configuration steps that you need for auditing Windows event 8004.
189
168
190
169
> [!NOTE]
191
-
>
192
170
> - Domain group policies to collect Windows event 8004 should be applied *only* to domain controllers.
193
-
> - When a Defender for Identity sensor parses Windows event 8004, Defender for Identity NTLM authentication activities are enriched with the server-accessed data.
194
-
195
-
**Related health issue:**[NTLM Auditing isn't enabled](../health-alerts.md)
196
171
197
172
To configure NTLM auditing:
198
173
199
-
1. After you configure your initial Advanced Audit Policy settings (via the [UI](#configure-advanced-audit-policy-settings-from-the-ui) or [PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)), open **Group Policy Management**. Then go to **Default Domain Controllers Policy** > **Local Policies** > **Security Options**.
174
+
1. After you configure your initial Advanced Audit Policy settings in the [Defender portal](#configure-advanced-audit-policy-settings-in-the-defender-portal) or [using PowerShell](#configure-advanced-audit-policy-settings-using-powershell), open **Group Policy Management**. Then go to **Default Domain Controllers Policy** > **Local Policies** > **Security Options**.
200
175
201
176
1. Configure the specified security policies as follows:
202
177
@@ -210,14 +185,11 @@ For example, to configure **Outgoing NTLM traffic to remote servers**, under **S
210
185
211
186
:::image type="content" source="../media/advanced-audit-policy-check-step-3.png" alt-text="Screenshot of the audit configuration for outgoing NTLM traffic to remote servers." border="false":::
212
187
213
-
###Configure domain object auditing
188
+
## Configure domain object auditing
214
189
215
190
To collect events for object changes, such as for event 4662, you must also configure object auditing on the user, group, computer, and other objects. The following procedure describes how to enable auditing in the Active Directory domain.
216
191
217
-
> [!IMPORTANT]
218
-
> Review and audit your policies (via the [UI](#configure-advanced-audit-policy-settings-from-the-ui) or [PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)) before you enable event collection, to ensure that the domain controllers are properly configured to record the necessary events. If this auditing is configured properly, it should have a minimal effect on server performance.
219
-
220
-
**Related health issue:**[Directory Services Object Auditing isn't enabled as required](../health-alerts.md)
192
+
To ensure that the domain controllers are properly configured to record the necessary events, review and audit your policies in the [Defender portal](#configure-advanced-audit-policy-settings-in-the-defender-portal) or [using PowerShell](#configure-advanced-audit-policy-settings-using-powershell) before you enable event collection. If auditing is configured properly, it has minimal effect on server performance.
221
193
222
194
To configure domain object auditing:
223
195
@@ -244,7 +216,7 @@ To configure domain object auditing:
244
216
245
217

246
218
247
-
1.You then return to **Auditing Entry**. Make the following selections:
219
+
1.Go back to **Auditing Entry**, and make the following selections:
248
220
249
221
1. For **Type**, select **Success**.
250
222
1. For **Applies to**, select **Descendant User objects**.
@@ -268,17 +240,14 @@ To configure domain object auditing:
## Configure auditing on the configuration container<a name="enable-auditing-on-an-exchange-object"></a>
357
322
358
-
>[!NOTE]
359
-
> The configuration container audit is required only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
323
+
The configuration container audit is required only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
360
324
361
-
**Related health issue:** [Auditing on the Configuration container is not enabled as required](../health-alerts.md)
362
325
1. Open the ADSI Edit tool. Select **Start** > **Run**, enter `ADSIEdit.msc`, and then select **OK**.
363
-
364
326
1. On the **Action** menu, select **Connect to**.
365
-
366
327
1. In the **Connection Settings** dialog, under **Select a well known Naming Context**, select **Configuration** > **OK**.
367
-
368
328
1. Expand the **Configuration** container to show the **Configuration** node, which begins with **"CN=Configuration,DC=..."**.
369
329
370
330
:::image type="content" source="../media/cn-configuration.png" alt-text="Screenshot of selections for opening properties for the CN Configuration node.":::
@@ -374,21 +334,15 @@ To configure auditing on Microsoft Entra Connect servers:
374
334

375
335
376
336
1. Select the **Security** tab, and then select **Advanced**.
377
-
378
337
1. In **Advanced Security Settings**, select the **Auditing** tab, and then select **Add**.
379
-
380
338
1. Choose **Select a principal**.
381
-
382
339
1. Under **Enter the object name to select**, enter **Everyone**. Then select **Check Names** > **OK**.
383
-
384
340
1. You then return to **Auditing Entry**. Make the following selections:
385
-
386
341
- For **Type**, select **All**.
387
342
- For **Applies to**, select **This object and all descendant objects**.
388
343
- Under **Permissions**, scroll down and select **Clear all**. Scroll up and select **Write all properties**.
389
344
390
345

Copy file name to clipboardExpand all lines: defender-for-identity/deploy/prerequisites-sensor-version-3.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,8 +101,7 @@ Learn more about Asset Management Rule [here](/defender-xdr/configure-asset-rule
101
101
102
102
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
103
103
104
-
The Defender for Identity sensor v3.x can offer preview feature that allows automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones. See [Configure auditing with the Defender for Identity sensor v3.x](configure-windows-event-collection.md#configure-windows-event-auditing-with-the-defender-for-identity-sensor-v3x).
105
-
If you do not select automatic Windows auditing configuration, you must [manually configure Windows event auditing](configure-windows-event-collection.md) in the Defender portal or using PowerShell.
104
+
For more information about configuring windows event auditing in the Defender portal or using PowerShell, see [Configure Windows event auditing](configure-windows-event-collection.md).
0 commit comments