Skip to content

Commit 4d0a7db

Browse files
Merge pull request #4984 from DeCohen/WI446094-configure-audit-policies-conform-confirm
Acrolinx fixes plus fix conform to confirm
2 parents 61203d4 + 9d3cb8f commit 4d0a7db

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Use the following procedures to configure auditing on the domain controllers tha
5959

6060
This procedure describes how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity via the UI.
6161

62-
**Related health issue:** [Directory Services Advanced Auditing is not enabled as required](../health-alerts.md)
62+
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
6363

6464
To configure your Advanced Audit Policy settings:
6565

@@ -100,7 +100,7 @@ To configure your Advanced Audit Policy settings:
100100

101101
1. From an elevated command prompt, enter `gpupdate`.
102102

103-
1. After you apply the policy via GPO, conform that the new events appear in the Event Viewer, under **Windows Logs** > **Security**.
103+
1. After you apply the policy via GPO, confirm that the new events appear in the Event Viewer, under **Windows Logs** > **Security**.
104104

105105
To test your audit policies from the command line, run the following command:
106106

@@ -114,7 +114,7 @@ For more information, see the [auditpol reference documentation](/windows-server
114114
115115
The following actions describe how to modify your domain controller's Advanced Audit Policy settings as needed for Defender for Identity by using PowerShell.
116116
117-
**Related health issue:** [Directory Services Advanced Auditing is not enabled as required](../health-alerts.md)
117+
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
118118
119119
To configure your settings, run:
120120
@@ -167,7 +167,7 @@ This section describes the extra configuration steps that you need for auditing
167167
> - Domain group policies to collect Windows event 8004 should be applied *only* to domain controllers.
168168
> - When a Defender for Identity sensor parses Windows event 8004, Defender for Identity NTLM authentication activities are enriched with the server-accessed data.
169169
170-
**Related health issue:** [NTLM Auditing is not enabled](../health-alerts.md)
170+
**Related health issue:** [NTLM Auditing isn't enabled](../health-alerts.md)
171171

172172
To configure NTLM auditing:
173173

@@ -192,7 +192,7 @@ To collect events for object changes, such as for event 4662, you must also conf
192192
> [!IMPORTANT]
193193
> Review and audit your policies (via the [UI](#configure-advanced-audit-policy-settings-from-the-ui) or [PowerShell](#configure-advanced-audit-policy-settings-by-using-powershell)) before you enable event collection, to ensure that the domain controllers are properly configured to record the necessary events. If this auditing is configured properly, it should have a minimal effect on server performance.
194194
195-
**Related health issue:** [Directory Services Object Auditing is not enabled as required](../health-alerts.md)
195+
**Related health issue:** [Directory Services Object Auditing isn't enabled as required](../health-alerts.md)
196196

197197
To configure domain object auditing:
198198

@@ -233,7 +233,7 @@ To configure domain object auditing:
233233

234234
![Screenshot of selecting permissions.](../media/select-permissions.png)
235235

236-
Now, all relevant changes to directory services appear as 4662 events when they're triggered.
236+
Now, all relevant changes to directory services appear as 4,662 events when they're triggered.
237237

238238
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types <sup>1</sup>
239239
- **Descendant Group Objects**
@@ -368,7 +368,7 @@ To configure auditing on Microsoft Entra Connect servers:
368368
369369
## Update legacy configurations
370370
371-
Defender for Identity no longer requires logging 1644 events. If you have either of the following settings enabled, you can remove them from the registry.
371+
Defender for Identity no longer requires logging 1,644 events. If you have either of the following settings enabled, you can remove them from the registry.
372372
373373
```reg
374374
Windows Registry Editor Version 5.00

0 commit comments

Comments
 (0)