SlideShare a Scribd company logo
Click to edit Master title style
Global Active Directory Seminar – 2017
Bharath – Technical Consultant
Bharathwajan.s@manageengine.com
bruce@manageengine.com
Click to edit Master title style
Active Directory Change monitoring
3
1. What is Change Monitoring in Active Directory ?
2. Advanced auditing to track Active Directory changes
3. Security log Recommendations
4. With ADAudit Plus what can we do ?
5. Configure Email notification for adverse changes
Agenda
4
• Tracking all changes that occur to objects in Active
Directory
• Users, Groups, Computers, Group Policy, Password change etc.
• Tracking all details regarding changes to objects in
Active Directory
• ‘Who’ did ‘What’ actions ‘When’ from ‘Where’, old and new settings
Active Directory Change Monitoring
• New user is created
• Domain policy is changed
• Group policy settings changes
• Domain admin group membership changes
• Privileged accounts change
• Service account modification
• User account is locked out
20
Admin’s ‘Most wanted’ changes to track
6
• Each domain controller must have auditing enabled
• Enable Auditing of AD through Group Policy
• Configure the Default Domain Controllers policy OR create
new GPO and link to Domain Controllers OU
• Auditing is located at: Computer
ConfigurationPoliciesWindows SettingsSecurity
SettingsLocal PoliciesAudit Policy
Auditing to Track Active Directory Changes
7
Auditing to Track Active Directory changes
8
• Success – Tracks successful changes to AD
• Failure – Tracks denials to change AD
8
Auditing to Track Active Directory Changes
9
9
• Configure object level auditing with ‘SACLs’
• Enable Auditing directory service access
• Configure Auditing tab after clicking Security tab of object
Properties
• Must select each property you'll want to track
Auditing to Track Active Directory Changes
10
• Events are stored and viewed in Event viewer
• Some events generated by Auditing Directory Service
Access
• Some events generated by Auditing Object Access
10
Auditing to Track Active Directory Changes
• Expanded auditing for auditors and security
professionals
• Provides details for most compliance mandates
• Provides more granularity
• Still events are triggered to Security Log
11
Advanced Auditing to Track AD Changes
Advanced Auditing to Track AD Changes
12
13
Advanced Auditing to Track AD Changes
DS Access–Directory
Service Changes
Reports changes to objects in Active Directory Domain Services (AD DS).
The types of changes that are reported are create, modify, move,
and undelete operations that are performed on an object. DS Change
auditing, where appropriate, indicates the old and new values of the
changed properties of the objects that were changed.
DS Access–Directory
Service Replication
Reports when replication between two domain controllers begins and
ends.
DS Access–Detailed
Directory Service
Replication
Reports detailed information about the information replicating between
domain controllers. These events can be very high in volume.
DS Access–Directory
Service Access
Reports when an AD DS object is accessed. Only objects with SACLs
cause audit events to be generated, and only when they are
accessed in a manner that matches their SACL. These events are
similar to the directory service access events in previous versions of
Windows Server.
• AD GPO in GPMC (2008 R2, 7, 8, 10, 2012 R2)
• Computer ConfigurationPoliciesWindows SettingsSecurity
SettingsAdvanced Audit Policy ConfigurationSystem
• Local GPO on Windows 2008 R2, 7, 8, 10 2012 R2)
• Computer ConfigurationWindows SettingsSecurity
SettingsAdvanced Audit Policy ConfigurationSystem
14
Advanced Auditing to Track AD Changes
• Manual configuration through CLI
• auditpol /get /category:*
• auditpol /set /subcategory:”DS Access” /success:enable
/failure:enable
• Command line check for ‘Winning GPO’
• gpresult /h gpresult.html
15
Advanced Auditing to Track AD Changes
Active Directory security and compliance: Comprehensive reporting for key security monitoring, and alerting ​
What we need ?
• Audit Account logon
• Audit Kerberos authentication service
• Audit Credential validation
• Audit Account Management
• Audit computer account management
• Audit Distribution group management
• Audit Security group management
• Audit User account management
• Audit DS Access
• Audit Directory Service Changes
• Audit Directory Service Access
• Audit Logon/Logoff
• Audit Logon
• Audit Logoff
• Audit Policy Change
• Audit policy change
• Authentication policy change
• Authorization policy change
• Audit System Events
• Audit System security state change
• Tracked changes are stored in Security Log on DC
where event occurred
• Each DC has a unique Security Log
• In order to view all events, must view each DC or
consolidate logs
18
Security Log in Event Viewer
Security Log in Event Viewer
Maximum Log size: 4GB
Microsoft Recommended: 300MB
19
• Can we consolidate logs from multiple computers into
a central log collector ?
• Event Forwarding
• Collector must be Win 2008 or greater
• Event Subscription defines forwarding rules
• Backward compatible with win XP/2003
20
Security Log in Event Viewer
• Automatically backup logs
• Create custom views by log, date, event level,
category, keywords etc..
• Associated scheduled jobs to alert for events
• Alerts are triggered by activity in log
• Alerts can be ‘messages’ or ‘emails’
• Alerts are for event ID, not ‘event details’
21
Security Log in Event Viewer
• Issues with Event viewer
• Security log size too small
• Interface does not provide option for reporting
• Hard to parse the details
• Events are logged on DC where event occurs – Multiple logs
• Alerting is not detailed enough
22
Security Log in Event Viewer
20
END RESULT,
Data
Poor
Insights
Ineffective
Actions
Active Directory security and compliance: Comprehensive reporting for key security monitoring, and alerting ​
• Reporting
• Over 125 default reports
• Over 10 default report areas
• Users
• Groups
• Passwords
• Logons
• More….
20
ADAudit Plus Reporting
• Audit policies configure properly
• Security log is prepped
• Sufficient privileges given
• Port are opened for communication
• 135 (RPC)
• 389 (LDAP)
• 445 (NetBios session service)
• Dynamic ports (49152-65535)
20
Do’s – For best possible outcome
• Auditing – Comprehensive reports in user friendly interface
• Alerting – Triggers alerts for critical actions
• Archiving – maintain history of changes over time
20
With ADAudit Plus what can we do ?
Real time AD change monitoring
29
• Identifying vulnerabilities
• Capacity planning
• Terminal services activity
• Audit Scenarios
• Enormous logon failures in short span
• User logon during ‘after business hours’
• Calculate logon duration on computers
User Logon Auditing
30
• Track all changes made ‘by’ a user & ‘to’ a user
• Password changes to ‘privileged accounts’
• Admin groups’ membership changes
• Audit scenarios
• Wrong delegation to a wrong object at a wrong time
• Privilege escalation
• Monitor password policy violation
Monitor AD object changes
31
• Admin group changes
• Service Account modifications
• Group policy setting changes
• Folder deletions/Permission changes
• Custom Alert configuration – Account lockout, Admin
user logon etc.
Email notification for ‘Most wanted’ events
32
• What is Change Monitoring in Active Directory ?
• Advanced auditing to track Active Directory changes
• Security log Recommendations
• With ADAudit Plus what can we do ?
• Configure Email notification for adverse changes
Summary
33
Every problem does have a solution!
support@adauditplus.com
bruce@manageengine.com
Click to edit Master title style
Questions?
Thank you!
Ad

Recommended

7 tips to simplify Active Directory Management ​
7 tips to simplify Active Directory Management ​
Zoho Corporation
 
Overcoming the challenges of Office 365 user management in hybrid environments​
Overcoming the challenges of Office 365 user management in hybrid environments​
Zoho Corporation
 
Self-service password management and single sign-on for on-premises AD and cl...
Self-service password management and single sign-on for on-premises AD and cl...
Zoho Corporation
 
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Zoho Corporation
 
Change Monitoring of Active Directory
Change Monitoring of Active Directory
Zoho Corporation
 
Controlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active Directory
Zoho Corporation
 
Building a document e-signing workflow with Azure Durable Functions
Building a document e-signing workflow with Azure Durable Functions
Joonas Westlin
 
WSO2Con USA 2017: Building a Secure Enterprise
WSO2Con USA 2017: Building a Secure Enterprise
WSO2
 
The Future of integrated Identity and Access Management
The Future of integrated Identity and Access Management
Zoho Corporation
 
Windows Azure Active Directory - from Atidan
Windows Azure Active Directory - from Atidan
David J Rosenthal
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
Joonas Westlin
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
IDERA Software
 
Deep thoughts from the real world of azure
Deep thoughts from the real world of azure
Michele Leroux Bustamante
 
Azure role based access control (rbac)
Azure role based access control (rbac)
Srikanth Kappagantula
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
Logic app x microsoft flow
Logic app x microsoft flow
Wagner Silveira
 
Data Architecture not Just for Microservices
Data Architecture not Just for Microservices
Eberhard Wolff
 
One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.
Zoho Corporation
 
1. Day 1 - Office 365 Trainning
1. Day 1 - Office 365 Trainning
Huy Pham
 
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2
 
[WSO2Con EU 2017] Streaming Analytics Patterns for Your Digital Enterprise
[WSO2Con EU 2017] Streaming Analytics Patterns for Your Digital Enterprise
WSO2
 
Dynamics 365 - Admin Tips & Tricks
Dynamics 365 - Admin Tips & Tricks
Sam Fernando
 
Service Manager – The New Helpdesk & CMDB Solution
Service Manager – The New Helpdesk & CMDB Solution
Amit Gatenyo
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
InterSystems Corporation
 
System center 2012 service manager
System center 2012 service manager
Mehdi Rahimi
 
Easy Auth Overview - Tokyo Azure Meetup - Feb 2018
Easy Auth Overview - Tokyo Azure Meetup - Feb 2018
Chris Gillum
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting Started
Taswar Bhatti
 
SQL Track: Hybrid cloud with sql server 2014
SQL Track: Hybrid cloud with sql server 2014
ITProceed
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1) ​
Zoho Corporation
 
Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​
Zoho Corporation
 

More Related Content

What's hot (20)

The Future of integrated Identity and Access Management
The Future of integrated Identity and Access Management
Zoho Corporation
 
Windows Azure Active Directory - from Atidan
Windows Azure Active Directory - from Atidan
David J Rosenthal
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
Joonas Westlin
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
IDERA Software
 
Deep thoughts from the real world of azure
Deep thoughts from the real world of azure
Michele Leroux Bustamante
 
Azure role based access control (rbac)
Azure role based access control (rbac)
Srikanth Kappagantula
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
Logic app x microsoft flow
Logic app x microsoft flow
Wagner Silveira
 
Data Architecture not Just for Microservices
Data Architecture not Just for Microservices
Eberhard Wolff
 
One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.
Zoho Corporation
 
1. Day 1 - Office 365 Trainning
1. Day 1 - Office 365 Trainning
Huy Pham
 
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2
 
[WSO2Con EU 2017] Streaming Analytics Patterns for Your Digital Enterprise
[WSO2Con EU 2017] Streaming Analytics Patterns for Your Digital Enterprise
WSO2
 
Dynamics 365 - Admin Tips & Tricks
Dynamics 365 - Admin Tips & Tricks
Sam Fernando
 
Service Manager – The New Helpdesk & CMDB Solution
Service Manager – The New Helpdesk & CMDB Solution
Amit Gatenyo
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
InterSystems Corporation
 
System center 2012 service manager
System center 2012 service manager
Mehdi Rahimi
 
Easy Auth Overview - Tokyo Azure Meetup - Feb 2018
Easy Auth Overview - Tokyo Azure Meetup - Feb 2018
Chris Gillum
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting Started
Taswar Bhatti
 
SQL Track: Hybrid cloud with sql server 2014
SQL Track: Hybrid cloud with sql server 2014
ITProceed
 
The Future of integrated Identity and Access Management
The Future of integrated Identity and Access Management
Zoho Corporation
 
Windows Azure Active Directory - from Atidan
Windows Azure Active Directory - from Atidan
David J Rosenthal
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
Joonas Westlin
 
Geek Sync | Handling HIPAA Compliance with Your Data Access
Geek Sync | Handling HIPAA Compliance with Your Data Access
IDERA Software
 
Azure role based access control (rbac)
Azure role based access control (rbac)
Srikanth Kappagantula
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
Logic app x microsoft flow
Logic app x microsoft flow
Wagner Silveira
 
Data Architecture not Just for Microservices
Data Architecture not Just for Microservices
Eberhard Wolff
 
One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.
Zoho Corporation
 
1. Day 1 - Office 365 Trainning
1. Day 1 - Office 365 Trainning
Huy Pham
 
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2Con USA 2017: Opening Keynote - Vision for Agile Digital Transformation
WSO2
 
[WSO2Con EU 2017] Streaming Analytics Patterns for Your Digital Enterprise
[WSO2Con EU 2017] Streaming Analytics Patterns for Your Digital Enterprise
WSO2
 
Dynamics 365 - Admin Tips & Tricks
Dynamics 365 - Admin Tips & Tricks
Sam Fernando
 
Service Manager – The New Helpdesk & CMDB Solution
Service Manager – The New Helpdesk & CMDB Solution
Amit Gatenyo
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
InterSystems Corporation
 
System center 2012 service manager
System center 2012 service manager
Mehdi Rahimi
 
Easy Auth Overview - Tokyo Azure Meetup - Feb 2018
Easy Auth Overview - Tokyo Azure Meetup - Feb 2018
Chris Gillum
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting Started
Taswar Bhatti
 
SQL Track: Hybrid cloud with sql server 2014
SQL Track: Hybrid cloud with sql server 2014
ITProceed
 

Viewers also liked (17)

Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1) ​
Zoho Corporation
 
Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​
Zoho Corporation
 
Active Directory Training
Active Directory Training
Nishad Sukumaran
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...
Adel Alghamdi
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Mehdi Poustchi Amin
 
Active Directory
Active Directory
Sandeep Kapadane
 
HoangNH_9-2016
HoangNH_9-2016
Nguyen Huy Hoang
 
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
Zoho Corporation
 
Effective User Life Cycle Management in Active Directory
Effective User Life Cycle Management in Active Directory
Zoho Corporation
 
Ubuntu server guide.2008
Ubuntu server guide.2008
ddnswat
 
Laporan Installasi ubuntu server
Laporan Installasi ubuntu server
Alda Abad
 
2013 12. Administrasi Server Linux Ubuntu
2013 12. Administrasi Server Linux Ubuntu
Syiroy Uddin
 
theday, windows hacking with commandline
theday, windows hacking with commandline
idsecconf
 
Ubuntu server-904 membuat-server_dengan_ubuntu
Ubuntu server-904 membuat-server_dengan_ubuntu
Raden Ozan
 
Ukk 2016 administrasi server ubuntu 14.04 lts - sahrul gunawan
Ukk 2016 administrasi server ubuntu 14.04 lts - sahrul gunawan
Syiroy Uddin
 
FOSS and Linux
FOSS and Linux
vargy
 
CTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPP
Spiffy
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1) ​
Zoho Corporation
 
Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​
Zoho Corporation
 
Active Directory Domain Services Installation & Configuration - Windows Ser...
Active Directory Domain Services Installation & Configuration - Windows Ser...
Adel Alghamdi
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Mehdi Poustchi Amin
 
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
Zoho Corporation
 
Effective User Life Cycle Management in Active Directory
Effective User Life Cycle Management in Active Directory
Zoho Corporation
 
Ubuntu server guide.2008
Ubuntu server guide.2008
ddnswat
 
Laporan Installasi ubuntu server
Laporan Installasi ubuntu server
Alda Abad
 
2013 12. Administrasi Server Linux Ubuntu
2013 12. Administrasi Server Linux Ubuntu
Syiroy Uddin
 
theday, windows hacking with commandline
theday, windows hacking with commandline
idsecconf
 
Ubuntu server-904 membuat-server_dengan_ubuntu
Ubuntu server-904 membuat-server_dengan_ubuntu
Raden Ozan
 
Ukk 2016 administrasi server ubuntu 14.04 lts - sahrul gunawan
Ukk 2016 administrasi server ubuntu 14.04 lts - sahrul gunawan
Syiroy Uddin
 
FOSS and Linux
FOSS and Linux
vargy
 
CTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPP
Spiffy
 
Ad

Similar to Active Directory security and compliance: Comprehensive reporting for key security monitoring, and alerting ​ (20)

Visão completa do ADAudit Plus
Visão completa do ADAudit Plus
Netrunner Tecnologia
 
ManageEngine ADAudit Plus - Active Directory audit software.
ManageEngine ADAudit Plus - Active Directory audit software.
Ashok Kumar
 
Active Directory Auditing
Active Directory Auditing
WILLA REYES
 
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
sudsdeep
 
Presentation AD Audit Plus ManageEngine .pptx
Presentation AD Audit Plus ManageEngine .pptx
AbdoulayeSoulama1
 
Understanding the Event Log
Understanding the Event Log
chuckbt
 
Tracking Active Directory Changes
Tracking Active Directory Changes
Vyapin Software Systems Private Limited
 
Managing security settings in windows server with group policy
Managing security settings in windows server with group policy
Miguel de la Cruz
 
AD Audit Plus a Detailed Walkthrough
AD Audit Plus a Detailed Walkthrough
ADAuditPlus
 
200308 Active Directory Security
200308 Active Directory Security
Armando Leon
 
ManageEngine ADAudit Plus - Active Directory audit software
ManageEngine ADAudit Plus - Active Directory audit software
Ashok Kumar
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Boni Yeamin
 
Active Directory Auditing A Crucial Step towards Enhanced Security.pptx
Active Directory Auditing A Crucial Step towards Enhanced Security.pptx
Northwind Technologies
 
Active directory solutions brochure
Active directory solutions brochure
Zoho Corporation
 
Sécurité Active Directory : 10 ans d’échec, mais beaucoup d’espoir ! - Par Ro...
Sécurité Active Directory : 10 ans d’échec, mais beaucoup d’espoir ! - Par Ro...
Identity Days
 
Ch10 Conducting Audits
Ch10 Conducting Audits
Information Technology
 
ManageEngine ADAudit Plus
ManageEngine ADAudit Plus
Majd Khriema
 
ADManager Plus helps City of Warsaw with comprehensive management of active d...
ADManager Plus helps City of Warsaw with comprehensive management of active d...
Zoho Corporation
 
Обзор и практическое применение Dell Change Auditor
Обзор и практическое применение Dell Change Auditor
BAKOTECH
 
Обзор и практическое применение Dell Change Auditor
Обзор и практическое применение Dell Change Auditor
Marina Gryshko
 
ManageEngine ADAudit Plus - Active Directory audit software.
ManageEngine ADAudit Plus - Active Directory audit software.
Ashok Kumar
 
Active Directory Auditing
Active Directory Auditing
WILLA REYES
 
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
sudsdeep
 
Presentation AD Audit Plus ManageEngine .pptx
Presentation AD Audit Plus ManageEngine .pptx
AbdoulayeSoulama1
 
Understanding the Event Log
Understanding the Event Log
chuckbt
 
Managing security settings in windows server with group policy
Managing security settings in windows server with group policy
Miguel de la Cruz
 
AD Audit Plus a Detailed Walkthrough
AD Audit Plus a Detailed Walkthrough
ADAuditPlus
 
200308 Active Directory Security
200308 Active Directory Security
Armando Leon
 
ManageEngine ADAudit Plus - Active Directory audit software
ManageEngine ADAudit Plus - Active Directory audit software
Ashok Kumar
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Boni Yeamin
 
Active Directory Auditing A Crucial Step towards Enhanced Security.pptx
Active Directory Auditing A Crucial Step towards Enhanced Security.pptx
Northwind Technologies
 
Active directory solutions brochure
Active directory solutions brochure
Zoho Corporation
 
Sécurité Active Directory : 10 ans d’échec, mais beaucoup d’espoir ! - Par Ro...
Sécurité Active Directory : 10 ans d’échec, mais beaucoup d’espoir ! - Par Ro...
Identity Days
 
ManageEngine ADAudit Plus
ManageEngine ADAudit Plus
Majd Khriema
 
ADManager Plus helps City of Warsaw with comprehensive management of active d...
ADManager Plus helps City of Warsaw with comprehensive management of active d...
Zoho Corporation
 
Обзор и практическое применение Dell Change Auditor
Обзор и практическое применение Dell Change Auditor
BAKOTECH
 
Обзор и практическое применение Dell Change Auditor
Обзор и практическое применение Dell Change Auditor
Marina Gryshko
 
Ad

More from Zoho Corporation (17)

Using indicators to deal with security attacks
Using indicators to deal with security attacks
Zoho Corporation
 
Ensuring security and consistency of users' self-service actions in Active Di...
Ensuring security and consistency of users' self-service actions in Active Di...
Zoho Corporation
 
Empowering ServiceNow help desk for Active Directory management
Empowering ServiceNow help desk for Active Directory management
Zoho Corporation
 
WannaCry Ransomware
WannaCry Ransomware
Zoho Corporation
 
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Zoho Corporation
 
ALIGN Technology timely alerts its employees of their password expiry using A...
ALIGN Technology timely alerts its employees of their password expiry using A...
Zoho Corporation
 
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Zoho Corporation
 
Case study-self-password-management-camh
Case study-self-password-management-camh
Zoho Corporation
 
Case study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreis
Zoho Corporation
 
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
Zoho Corporation
 
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
Zoho Corporation
 
Indispensable tool to help with Password Reset Issues
Indispensable tool to help with Password Reset Issues
Zoho Corporation
 
ADManager Plus Makes Admissions A CakeWalk For College Montmorency
ADManager Plus Makes Admissions A CakeWalk For College Montmorency
Zoho Corporation
 
Helpdesk delegation
Helpdesk delegation
Zoho Corporation
 
How ADManager Plus helped a local govt. wipe out stale accounts from its AD
How ADManager Plus helped a local govt. wipe out stale accounts from its AD
Zoho Corporation
 
HomeBanc trusts ManageEngine ADSelfService Plus to resolve its Password expir...
HomeBanc trusts ManageEngine ADSelfService Plus to resolve its Password expir...
Zoho Corporation
 
Password Reset Issues Effectively Solved
Password Reset Issues Effectively Solved
Zoho Corporation
 
Using indicators to deal with security attacks
Using indicators to deal with security attacks
Zoho Corporation
 
Ensuring security and consistency of users' self-service actions in Active Di...
Ensuring security and consistency of users' self-service actions in Active Di...
Zoho Corporation
 
Empowering ServiceNow help desk for Active Directory management
Empowering ServiceNow help desk for Active Directory management
Zoho Corporation
 
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Zoho Corporation
 
ALIGN Technology timely alerts its employees of their password expiry using A...
ALIGN Technology timely alerts its employees of their password expiry using A...
Zoho Corporation
 
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Zoho Corporation
 
Case study-self-password-management-camh
Case study-self-password-management-camh
Zoho Corporation
 
Case study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreis
Zoho Corporation
 
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
Zoho Corporation
 
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
Zoho Corporation
 
Indispensable tool to help with Password Reset Issues
Indispensable tool to help with Password Reset Issues
Zoho Corporation
 
ADManager Plus Makes Admissions A CakeWalk For College Montmorency
ADManager Plus Makes Admissions A CakeWalk For College Montmorency
Zoho Corporation
 
How ADManager Plus helped a local govt. wipe out stale accounts from its AD
How ADManager Plus helped a local govt. wipe out stale accounts from its AD
Zoho Corporation
 
HomeBanc trusts ManageEngine ADSelfService Plus to resolve its Password expir...
HomeBanc trusts ManageEngine ADSelfService Plus to resolve its Password expir...
Zoho Corporation
 
Password Reset Issues Effectively Solved
Password Reset Issues Effectively Solved
Zoho Corporation
 

Recently uploaded (20)

OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 

Active Directory security and compliance: Comprehensive reporting for key security monitoring, and alerting ​

  • 1. Click to edit Master title style Global Active Directory Seminar – 2017 Bharath – Technical Consultant [email protected] [email protected]
  • 2. Click to edit Master title style Active Directory Change monitoring
  • 3. 3 1. What is Change Monitoring in Active Directory ? 2. Advanced auditing to track Active Directory changes 3. Security log Recommendations 4. With ADAudit Plus what can we do ? 5. Configure Email notification for adverse changes Agenda
  • 4. 4 • Tracking all changes that occur to objects in Active Directory • Users, Groups, Computers, Group Policy, Password change etc. • Tracking all details regarding changes to objects in Active Directory • ‘Who’ did ‘What’ actions ‘When’ from ‘Where’, old and new settings Active Directory Change Monitoring
  • 5. • New user is created • Domain policy is changed • Group policy settings changes • Domain admin group membership changes • Privileged accounts change • Service account modification • User account is locked out 20 Admin’s ‘Most wanted’ changes to track
  • 6. 6 • Each domain controller must have auditing enabled • Enable Auditing of AD through Group Policy • Configure the Default Domain Controllers policy OR create new GPO and link to Domain Controllers OU • Auditing is located at: Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesAudit Policy Auditing to Track Active Directory Changes
  • 7. 7 Auditing to Track Active Directory changes
  • 8. 8 • Success – Tracks successful changes to AD • Failure – Tracks denials to change AD 8 Auditing to Track Active Directory Changes
  • 9. 9 9 • Configure object level auditing with ‘SACLs’ • Enable Auditing directory service access • Configure Auditing tab after clicking Security tab of object Properties • Must select each property you'll want to track Auditing to Track Active Directory Changes
  • 10. 10 • Events are stored and viewed in Event viewer • Some events generated by Auditing Directory Service Access • Some events generated by Auditing Object Access 10 Auditing to Track Active Directory Changes
  • 11. • Expanded auditing for auditors and security professionals • Provides details for most compliance mandates • Provides more granularity • Still events are triggered to Security Log 11 Advanced Auditing to Track AD Changes
  • 12. Advanced Auditing to Track AD Changes 12
  • 13. 13 Advanced Auditing to Track AD Changes DS Access–Directory Service Changes Reports changes to objects in Active Directory Domain Services (AD DS). The types of changes that are reported are create, modify, move, and undelete operations that are performed on an object. DS Change auditing, where appropriate, indicates the old and new values of the changed properties of the objects that were changed. DS Access–Directory Service Replication Reports when replication between two domain controllers begins and ends. DS Access–Detailed Directory Service Replication Reports detailed information about the information replicating between domain controllers. These events can be very high in volume. DS Access–Directory Service Access Reports when an AD DS object is accessed. Only objects with SACLs cause audit events to be generated, and only when they are accessed in a manner that matches their SACL. These events are similar to the directory service access events in previous versions of Windows Server.
  • 14. • AD GPO in GPMC (2008 R2, 7, 8, 10, 2012 R2) • Computer ConfigurationPoliciesWindows SettingsSecurity SettingsAdvanced Audit Policy ConfigurationSystem • Local GPO on Windows 2008 R2, 7, 8, 10 2012 R2) • Computer ConfigurationWindows SettingsSecurity SettingsAdvanced Audit Policy ConfigurationSystem 14 Advanced Auditing to Track AD Changes
  • 15. • Manual configuration through CLI • auditpol /get /category:* • auditpol /set /subcategory:”DS Access” /success:enable /failure:enable • Command line check for ‘Winning GPO’ • gpresult /h gpresult.html 15 Advanced Auditing to Track AD Changes
  • 17. What we need ? • Audit Account logon • Audit Kerberos authentication service • Audit Credential validation • Audit Account Management • Audit computer account management • Audit Distribution group management • Audit Security group management • Audit User account management • Audit DS Access • Audit Directory Service Changes • Audit Directory Service Access • Audit Logon/Logoff • Audit Logon • Audit Logoff • Audit Policy Change • Audit policy change • Authentication policy change • Authorization policy change • Audit System Events • Audit System security state change
  • 18. • Tracked changes are stored in Security Log on DC where event occurred • Each DC has a unique Security Log • In order to view all events, must view each DC or consolidate logs 18 Security Log in Event Viewer
  • 19. Security Log in Event Viewer Maximum Log size: 4GB Microsoft Recommended: 300MB 19
  • 20. • Can we consolidate logs from multiple computers into a central log collector ? • Event Forwarding • Collector must be Win 2008 or greater • Event Subscription defines forwarding rules • Backward compatible with win XP/2003 20 Security Log in Event Viewer
  • 21. • Automatically backup logs • Create custom views by log, date, event level, category, keywords etc.. • Associated scheduled jobs to alert for events • Alerts are triggered by activity in log • Alerts can be ‘messages’ or ‘emails’ • Alerts are for event ID, not ‘event details’ 21 Security Log in Event Viewer
  • 22. • Issues with Event viewer • Security log size too small • Interface does not provide option for reporting • Hard to parse the details • Events are logged on DC where event occurs – Multiple logs • Alerting is not detailed enough 22 Security Log in Event Viewer
  • 25. • Reporting • Over 125 default reports • Over 10 default report areas • Users • Groups • Passwords • Logons • More…. 20 ADAudit Plus Reporting
  • 26. • Audit policies configure properly • Security log is prepped • Sufficient privileges given • Port are opened for communication • 135 (RPC) • 389 (LDAP) • 445 (NetBios session service) • Dynamic ports (49152-65535) 20 Do’s – For best possible outcome
  • 27. • Auditing – Comprehensive reports in user friendly interface • Alerting – Triggers alerts for critical actions • Archiving – maintain history of changes over time 20 With ADAudit Plus what can we do ?
  • 28. Real time AD change monitoring
  • 29. 29 • Identifying vulnerabilities • Capacity planning • Terminal services activity • Audit Scenarios • Enormous logon failures in short span • User logon during ‘after business hours’ • Calculate logon duration on computers User Logon Auditing
  • 30. 30 • Track all changes made ‘by’ a user & ‘to’ a user • Password changes to ‘privileged accounts’ • Admin groups’ membership changes • Audit scenarios • Wrong delegation to a wrong object at a wrong time • Privilege escalation • Monitor password policy violation Monitor AD object changes
  • 31. 31 • Admin group changes • Service Account modifications • Group policy setting changes • Folder deletions/Permission changes • Custom Alert configuration – Account lockout, Admin user logon etc. Email notification for ‘Most wanted’ events
  • 32. 32 • What is Change Monitoring in Active Directory ? • Advanced auditing to track Active Directory changes • Security log Recommendations • With ADAudit Plus what can we do ? • Configure Email notification for adverse changes Summary
  • 34. Click to edit Master title style Questions? Thank you!