This page describes the steps to enable more granular Active Directory audit logs that can in turn be ingested and correlated in QRadar. This guide should be considered as minimum policy, and limited in scope to auditing changes made to Active Directory Users, Groups, Policies, and is not intended to prescribe final organisation wide audit policy.
The enhanced event visibility documented on this page provides more insight into a number of adversary techniques including:
> Reconnaissance
> Resource Development
> Persistence
> Privilege Escalation
> Defense Evasion
> Credential Access
> Lateral Movement
> Collection
Although the default Active Directory logging settings generate a range of events, the below settings will further enhance your logging capabilities and provide enriched data in the event of a security incident.
Some of the settings outlined may already be set as described within your environment, however it is advised that this be verified. Upon completion of the below steps, please inform the Secure-ISS SOC so that we can validate that the enhanced events are being received and correlated accordingly.
Note: The below steps are for Windows Server 2008 and above
The settings below will ensure appropriate minimum logging for events pertaining to and only to:
> Kerberos authentication ticket-granting ticket (TGT) requests.
> Computer accounts being created, changed, or deleted.
> Distribution-group management tasks.
> Security group management tasks.
> User account management tasks.
> Process being created / terminated.
> Changes made to objects in Active Directory Domain Services.
> Active Directory Domain Services objects being accessed.
> Events generated by RADIUS (IAS) and Network Access Protection (NAP) related to user access requests.
> Operations with scheduled tasks, COM+ objects and indirect object access requests.
> Changes made to authentication / authorisation policy.
> Startup, recovery, and shutdown events, and information about changes in system time.Wider audit policy should be considered and implemented as per Best Practice guidelines.
Open Group Policy Management Console
Right click / Edit “Default Domain Controllers Policy”
Configure as required
Audit policies
Computer Configuration > Policies > Windows Settings > Security Settings > Local Polices > Security Options
SACL’s are used to define security policies system wide. The settings below will ensure enhanced logging is in use, which will allow more thorough generation of events for auditing purposes. In addition to auditing, these logs are intended to enhance your security posture and assist in early detection of unusual or malicious activity.
Some of the settings outlined below may be in use within your organisation, it is advised that the following settings are verified.
To configure SACL, you must be either a member of the “Domain Admins” group, the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority.
Any of the the below steps may skipped if they are not relevant for your organisation
Configure the following where appropriate
When you create the new ACL allowing access, some values will be selected automatically.
Ensure all checkboxes are cleared using the “Clear all” button if creating a new entry, this applies to all following entries. This button’s location requires you to scroll to the very bottom of list of permission flags.
Complete the above steps for all of the following
Ensure you are modifying the “Auditing” tab!
What is being defined here is whether or not an audit event should be generated for a given object, depending on who the user is and where the object is located. For example for the first listed below, we want to create an audit event when “Everyone”/Anyone creates an “Organisational Unit” in the root of the domain and all descendant objects
Eg: Set the “Applies To” field to This object and all descendant objects and check the following checkboxes. Then set the “Applies To” field to Descendant Organizational Unit objects and check the listed checkboxes and so on…
This object and all descendant objects
Permissions > Create Organizational Unit objects
Permissions > Delete Organizational Unit objects
Permissions > Create groupPolicyContainer Objects
Permissions > Delete groupPolicyContainer Objects
Descendant Organizational Unit objects
Permissions > Delete
Permissions > Modify Permissions
Properties > Write All Properties
Descendant groupPolicyContainer objects
Permissions > Delete
Permissions > Modify Permissions
Properties > Write All Properties
Descendant User objects
Permissions > Delete
Permissions > Modify Permissions
Permissions > All Extended Rights
Properties > Write All Properties
Descendant Group objects
Permissions > Delete
Permissions > Modify Permissions
Permissions > All Extended Rights
Properties > Write All Properties
Descendant Computer objects
Permissions > Delete
Permissions > Modify Permissions
Permissions > All Extended Rights
Properties > Write All Properties
Descendant Contact objects
Permissions > Delete
Permissions > Modify Permissions
Properties > Write All Properties
Descendant Container objects
Permissions > Delete
Permissions > Modify Permissions
Properties > Write All Properties
OK -> APPLY -> OK -> OK
Everyone - Success
This object and all descendant objects
Create msDS-PasswordSettings objects
Delete msDS-PasswordSetting objects
Descendant msDS-PasswordSettings objects
Write All Properties
Delete
Modify Permissions
OK -> APPLY -> OK -> OK
Follow steps for either Configuration OR Schema, whichever is appropriate for your environment.
Everyone - Successful
This object and all descendant objects
Create All Child objects
Delete All child objects
Delete
Write All Properties
Modify Permissions
All Extended Rights
OK -> APPLY -> OK -> OK
Create DNS Zones objects - This object and all descendant objects
Delete DNS Zones objects - This object and all descendant objects
Write All Properties - Descendant DNS Zone objects
Delete - Descendant DNS Zone objects
Modify Permissions - Descendant DNS Zone objects
Create DNS Nodes objects - Descendant DNS Zone objects
Delete DNS Nodes objects - Descendant DNS Zone objects
Write All Properties - Descendant DNS Node objects
Delete - Descendant DNS Node objects
Modify Permissions - Descendant DNS Node objects