Skip to content

Commit 2f182a6

Browse files
Merge pull request #5775 from AbbyMSFT/automatic-windows-auditing
Remove docs for automatic windows auditing
2 parents 17f758e + 13f263c commit 2f182a6

File tree

3 files changed

+36
-83
lines changed

3 files changed

+36
-83
lines changed

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 33 additions & 79 deletions
Original file line numberDiff line numberDiff line change
@@ -9,58 +9,44 @@ ms.reviewer: rlitinsky
99
# Configure audit policies for Windows event logs
1010

1111
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
12-
This article describes how to optimally configure the Advanced Audit Policy settings on your domain controllers to avoid gaps in the event logs and incomplete Defender for Identity coverage.
12+
This article describes how to configure the advanced audit policy settings to avoid gaps in the event logs and incomplete Defender for Identity coverage.
1313

14-
## Configure Windows event auditing with the Defender for Identity sensor v3.x
15-
16-
Defender for Identity sensor v3.x offers preview feature that allows automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones.
17-
18-
To turn on automatic windows auditing:
19-
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings**, and then **Identities**.
20-
1. In the **General** section, select **Advanced features**.
21-
1. Turn on **Automatic Windows auditing configuration**.​
22-
23-
If you do not select automatic Windows auditing configuration, you must manually configure Windows event auditing in the Defender portal or using PowerShell.
24-
25-
## Configure Windows event auditing with the Defender for Identity sensor v2.x
26-
27-
Configure Windows event auditing on your domain controllers to support Defender for Identity detections.
28-
Defender for Identity generates health issues for each of these scenarios if they're detected. For more information, see [Microsoft Defender for Identity health issues](../health-alerts.md).
14+
Defender for Identity generates health alerts when it detects incorrect windows event auditing configurations. For more information, see [Microsoft Defender for Identity health alerts](../health-alerts.md).
2915

3016
## Prerequisites
3117

32-
- Before you run Defender for Identity PowerShell commands, make sure that you download the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
18+
If you are using the Active Directory PowerShell module to configure a domain controller, make sure that you download the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
19+
3320
> [!NOTE]
34-
> The Active Directory PowerShell module is required when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
21+
> The Active Directory PowerShell module is only required when configuring Defender for Identity on domain controllers. It isn’t required on AD CS servers running the Certification Authority Role Service.
3522
36-
## Generate a report of current configurations via PowerShell
23+
## Generate a report of current configurations using PowerShell
3724

3825
Before you start creating new event and audit policies, we recommend that you run the following PowerShell command to generate a report of your current domain configurations:
3926

4027
```powershell
4128
New-MDIConfigurationReport -Path "C:\Reports" -Mode Domain -Identity "DOMAIN\ServiceAccountName" -OpenHtmlReport
4229
```
43-
44-
> [!NOTE]
45-
> When using `-Mode Domain`, include the `-Identity` parameter to avoid an interactive prompt.
46-
> For more information, see: [New-MDIConfigurationReport](/powershell/module/defenderforidentity/new-mdiconfigurationreport?view=defenderforidentity-latest&preserve-view=true).
47-
48-
In the preceding command:
30+
Where:
4931

5032
- `Path` specifies the path to save the reports to.
5133
- `Mode` specifies whether you want to use `Domain` or `LocalMachine` mode. In `Domain` mode, the settings are collected from the Group Policy objects (GPOs). In `LocalMachine` mode, the settings are collected from the local machine.
34+
35+
The `Domain` mode report includes only configurations set as group policies on the domain. If you have settings defined locally on your domain controllers, we recommend that you also run the [Test-MdiReadiness.ps1](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script.
36+
5237
- `OpenHtmlReport` opens the HTML report after the report is generated.
5338

39+
> [!NOTE]
40+
> When using `-Mode Domain`, include the `-Identity` parameter to avoid an interactive prompt.
41+
> For more information, see: [New-MDIConfigurationReport](/powershell/module/defenderforidentity/new-mdiconfigurationreport?view=defenderforidentity-latest&preserve-view=true).
42+
5443
For example, to generate a report and open it in your default browser, run the following command:
5544

5645
```powershell
5746
New-MDIConfigurationReport -Path "C:\Reports" -Mode Domain -OpenHtmlReport
5847
```
5948

60-
For more information, see the [DefenderforIdentity PowerShell reference](/powershell/module/defenderforidentity/new-mdiconfigurationreport).
61-
62-
> [!TIP]
63-
> The `Domain` mode report includes only configurations set as group policies on the domain. If you have settings defined locally on your domain controllers, we recommend that you also run the [Test-MdiReadiness.ps1](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script.
49+
For more information, see the [Defender for Identity PowerShell reference](/powershell/module/defenderforidentity/new-mdiconfigurationreport).
6450

6551
## Configure Windows event auditing for domain controllers
6652

@@ -72,16 +58,12 @@ Update your Advanced Audit Policy settings and extra configurations for specific
7258

7359
For more information, see [Advanced security auditing FAQ](/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/advanced-security-auditing-faq).
7460

75-
Use the following procedures to configure auditing on the domain controllers that you're using with Defender for Identity.
61+
You can configure auditing on the domain controllers either in the portal or using PowerShell.
7662

77-
### Configure Advanced Audit Policy settings from the UI
63+
### Configure Advanced Audit Policy settings in the Defender portal
7864

7965
This procedure describes how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity via the UI.
8066

81-
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
82-
83-
To configure your Advanced Audit Policy settings:
84-
8567
1. Sign in to the server as **Domain Administrator**.
8668
1. Open the Group Policy Management Editor from **Server Manager** > **Tools** > **Group Policy Management**.
8769
1. Expand **Domain Controllers Organizational Units**, right-click **Default Domain Controllers Policy**, and then select **Edit**.
@@ -118,7 +100,6 @@ To configure your Advanced Audit Policy settings:
118100
![Screenshot of the Audit Security Group Management Properties dialog.](../media/advanced-audit-policy-check-step-4.png)
119101

120102
1. From an elevated command prompt, enter `gpupdate`.
121-
122103
1. After you apply the policy via GPO, confirm that the new events appear in the Event Viewer, under **Windows Logs** > **Security**.
123104

124105
To test your audit policies from the command line, run the following command:
@@ -129,12 +110,10 @@ To configure your Advanced Audit Policy settings:
129110
130111
For more information, see the [auditpol reference documentation](/windows-server/administration/windows-commands/auditpol).
131112
132-
### Configure Advanced Audit Policy settings by using PowerShell
113+
### Configure Advanced Audit Policy settings using PowerShell
133114
134115
The following actions describe how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity by using PowerShell.
135116
136-
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
137-
138117
The following command defines all settings for the domain, creates group policy objects, and links them.
139118
140119
```powershell
@@ -147,7 +126,7 @@ To configure your settings, run:
147126
Set-MDIConfiguration [-Mode] <String> [-Configuration] <String[]> [-CreateGpoDisabled] [-SkipGpoLink] [-Force]
148127
```
149128

150-
In the preceding command:
129+
Where:
151130

152131
- `Mode` specifies whether you want to use `Domain` or `LocalMachine` mode. In `Domain` mode, the settings are collected from the Group Policy objects. In `LocalMachine` mode, the settings are collected from the local machine.
153132
- `Configuration` specifies which configuration to set. Use `All` to set all configurations.
@@ -161,7 +140,7 @@ To view your audit policies, use the `Get-MDIConfiguration` command to show curr
161140
Get-MDIConfiguration [-Mode] <String> [-Configuration] <String[]>
162141
```
163142

164-
In the preceding command:
143+
Where:
165144

166145
- `Mode` specifies whether you want to use `Domain` or `LocalMachine` mode. In `Domain` mode, the settings are collected from the Group Policy objects. In `LocalMachine` mode, the settings are collected from the local machine.
167146
- `Configuration` specifies which configuration to get. Use `All` to get all configurations.
@@ -172,7 +151,7 @@ To test your audit policies, use the `Test-MDIConfiguration` command to get a `t
172151
Test-MDIConfiguration [-Mode] <String> [-Configuration] <String[]>
173152
```
174153

175-
In the preceding command:
154+
Where:
176155

177156
- `Mode` specifies whether you want to use `Domain` or `LocalMachine` mode. In `Domain` mode, the settings are collected from the Group Policy objects. In `LocalMachine` mode, the settings are collected from the local machine.
178157
- `Configuration` specifies which configuration to test. Use `All` to test all configurations.
@@ -183,20 +162,16 @@ For more information, see the following [DefenderForIdentity PowerShell referenc
183162
- [Get-MDIConfiguration](/powershell/module/defenderforidentity/get-mdiconfiguration)
184163
- [Test-MDIConfiguration](/powershell/module/defenderforidentity/test-mdiconfiguration)
185164

186-
### Configure NTLM auditing
165+
## Configure NTLM auditing
187166

188-
This section describes the extra configuration steps that you need for auditing Windows event 8004.
167+
When a Defender for Identity sensor parses Windows event 8004, Defender for Identity NTLM authentication activities are enriched with the server-accessed data. This section describes the extra configuration steps that you need for auditing Windows event 8004.
189168

190169
> [!NOTE]
191-
>
192170
> - Domain group policies to collect Windows event 8004 should be applied *only* to domain controllers.
193-
> - When a Defender for Identity sensor parses Windows event 8004, Defender for Identity NTLM authentication activities are enriched with the server-accessed data.
194-
195-
**Related health issue:** [NTLM Auditing isn't enabled](../health-alerts.md)
196171
197172
To configure NTLM auditing:
198173

199-
1. After you configure your initial Advanced Audit Policy settings (via the [UI](#configure-advanced-audit-policy-settings-from-the-ui) or [PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)), open **Group Policy Management**. Then go to **Default Domain Controllers Policy** > **Local Policies** > **Security Options**.
174+
1. After you configure your initial Advanced Audit Policy settings in the [Defender portal](#configure-advanced-audit-policy-settings-in-the-defender-portal) or [using PowerShell](#configure-advanced-audit-policy-settings-using-powershell), open **Group Policy Management**. Then go to **Default Domain Controllers Policy** > **Local Policies** > **Security Options**.
200175

201176
1. Configure the specified security policies as follows:
202177

@@ -210,14 +185,11 @@ For example, to configure **Outgoing NTLM traffic to remote servers**, under **S
210185

211186
:::image type="content" source="../media/advanced-audit-policy-check-step-3.png" alt-text="Screenshot of the audit configuration for outgoing NTLM traffic to remote servers." border="false":::
212187

213-
### Configure domain object auditing
188+
## Configure domain object auditing
214189

215190
To collect events for object changes, such as for event 4662, you must also configure object auditing on the user, group, computer, and other objects. The following procedure describes how to enable auditing in the Active Directory domain.
216191

217-
> [!IMPORTANT]
218-
> Review and audit your policies (via the [UI](#configure-advanced-audit-policy-settings-from-the-ui) or [PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)) before you enable event collection, to ensure that the domain controllers are properly configured to record the necessary events. If this auditing is configured properly, it should have a minimal effect on server performance.
219-
220-
**Related health issue:** [Directory Services Object Auditing isn't enabled as required](../health-alerts.md)
192+
To ensure that the domain controllers are properly configured to record the necessary events, review and audit your policies in the [Defender portal](#configure-advanced-audit-policy-settings-in-the-defender-portal) or [using PowerShell](#configure-advanced-audit-policy-settings-using-powershell) before you enable event collection. If auditing is configured properly, it has minimal effect on server performance.
221193

222194
To configure domain object auditing:
223195

@@ -244,7 +216,7 @@ To configure domain object auditing:
244216

245217
![Screenshot of entering an object name of Everyone.](../media/select-everyone.png)
246218

247-
1. You then return to **Auditing Entry**. Make the following selections:
219+
1. Go back to **Auditing Entry**, and make the following selections:
248220

249221
1. For **Type**, select **Success**.
250222
1. For **Applies to**, select **Descendant User objects**.
@@ -268,17 +240,14 @@ To configure domain object auditing:
268240
- **Descendant msDS-DelegatedManagedServiceAccount Objects** <sup>2</sup>
269241

270242
> [!NOTE]
271-
> 1. Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.
272-
> 2. The **msDS-DelegatedManagedServiceAccount** class is relevant only for domains running at least one Windows Server 2025 domain controller.
243+
> - You could also assign auditing permissions on **All descendant objects**, using only the object types detailed in the last step.
244+
> - The **msDS-DelegatedManagedServiceAccount** class is relevant only for domains running at least one Windows Server 2025 domain controller.
273245
274246
## Configure auditing on AD FS
275247

276-
**Related health issue:** [Auditing on the AD FS container is not enabled as required](../health-alerts.md)
277-
278248
To configure auditing on Active Directory Federation Services (AD FS):
279249

280250
1. Go to the **Active Directory Users and Computers** console, and select the domain where you want to enable the logs.
281-
282251
1. Go to **Program Data** > **Microsoft** > **ADFS**.
283252

284253
![Screenshot of a container for Active Directory Federation Services.](../media/adfs-container.png)
@@ -322,12 +291,9 @@ If you're working with a dedicated server that has Active Directory Certificate
322291

323292
```cmd
324293
certutil –setreg CA\AuditFilter 127
325-
326-
327294
net stop certsvc && net start certsvc
328-
````
329-
330-
- To configure CA auditing by using the GUI:
295+
```
296+
- To configure CA auditing in the Defender portal:
331297
332298
1. Select **Start** > **Certification Authority (MMC Desktop application)**. Right-click your CA's name and select **Properties**.
333299
@@ -352,19 +318,13 @@ To configure auditing on Microsoft Entra Connect servers:
352318
353319
![Screenshot of the Group Policy Management Editor.](media/configure-windows-event-collection/image.png)
354320
355-
## Configure auditing on the configuration container
356-
<a name="enable-auditing-on-an-exchange-object"></a>
321+
## Configure auditing on the configuration container<a name="enable-auditing-on-an-exchange-object"></a>
357322
358-
>[!NOTE]
359-
> The configuration container audit is required only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
323+
The configuration container audit is required only for environments that currently have or previously had Microsoft Exchange, as these environments have an Exchange container located within the domain's Configuration section.
360324
361-
**Related health issue:** [Auditing on the Configuration container is not enabled as required](../health-alerts.md)
362325
1. Open the ADSI Edit tool. Select **Start** > **Run**, enter `ADSIEdit.msc`, and then select **OK**.
363-
364326
1. On the **Action** menu, select **Connect to**.
365-
366327
1. In the **Connection Settings** dialog, under **Select a well known Naming Context**, select **Configuration** > **OK**.
367-
368328
1. Expand the **Configuration** container to show the **Configuration** node, which begins with **"CN=Configuration,DC=..."**.
369329
370330
:::image type="content" source="../media/cn-configuration.png" alt-text="Screenshot of selections for opening properties for the CN Configuration node.":::
@@ -374,21 +334,15 @@ To configure auditing on Microsoft Entra Connect servers:
374334
![Screenshot of selections for opening properties for the Configuration node.](../media/configuration-properties.png)
375335
376336
1. Select the **Security** tab, and then select **Advanced**.
377-
378337
1. In **Advanced Security Settings**, select the **Auditing** tab, and then select **Add**.
379-
380338
1. Choose **Select a principal**.
381-
382339
1. Under **Enter the object name to select**, enter **Everyone**. Then select **Check Names** > **OK**.
383-
384340
1. You then return to **Auditing Entry**. Make the following selections:
385-
386341
- For **Type**, select **All**.
387342
- For **Applies to**, select **This object and all descendant objects**.
388343
- Under **Permissions**, scroll down and select **Clear all**. Scroll up and select **Write all properties**.
389344
390345
![Screenshot of the auditing settings for the Configuration container.](../media/audit-configuration.png)
391-
392346
1. Select **OK**.
393347
394348
## Update legacy configurations

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,8 +101,7 @@ Learn more about Asset Management Rule [here](/defender-xdr/configure-asset-rule
101101

102102
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
103103

104-
The Defender for Identity sensor v3.x can offer preview feature that allows automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones. See [Configure auditing with the Defender for Identity sensor v3.x](configure-windows-event-collection.md#configure-windows-event-auditing-with-the-defender-for-identity-sensor-v3x).
105-
If you do not select automatic Windows auditing configuration, you must [manually configure Windows event auditing](configure-windows-event-collection.md) in the Defender portal or using PowerShell.
104+
For more information about configuring windows event auditing in the Defender portal or using PowerShell, see [Configure Windows event auditing](configure-windows-event-collection.md).
106105

107106
## Test your prerequisites
108107

0 commit comments

Comments
 (0)