Skip to main content

Active Directory Auditing Configuration

The Access Analyzer for Active Directory Solution is compatible with the following Active Directory versions as targets:

  • Windows Server 2016 and later
  • Windows 2003 Forest level or higher

NOTE: See the Microsoft Windows Server end of support and Microsoft 365 Apps article for additional information.

Domain Controller Requirements

The following are requirements for the domain controllers to be scanned:

  • .NET Framework 4.5+ installed
  • WINRM Service installed

Data Collectors

Successful use of the Access Analyzer Active Directory solution requires the necessary settings and permissions in a Microsoft® Active Directory® environment described in this topic and its subtopics. This solution employs the following data collectors to scan for groups, users, computers, passwords, permissions, group policies, and domain information:

Permissions

  • Member of the Domain Administrators group

The majority of jobs in the Active Directory solutions rely on tables with queried data from the data collectors mentioned above to perform analysis and generate reports. The remaining jobs utilize data collectors to scan environments, and require additional permissions on the target host.

RECOMMENDED: Use Domain/Local Administrator privileges to run Access Analyzer against an Active Directory domain controller.

There is a least privilege model for scanning your domain. See the Least Privilege Model topic for additional information.

Ports

The following firewall ports are needed:

For ADInventory Data Collector

  • TCP 389
  • TCP 135-139
  • Randomly allocated high TCP ports

For ActiveDirectory Data Collector

  • TCP 389/636
  • TCP 135-139
  • Randomly allocated high TCP ports

For ADActivity Data Collector

  • TCP 4494 (configurable within the Netwrix Activity Monitor)

For GroupPolicy Data Collector

  • TCP 389
  • TCP 135-139
  • Randomly allocated high TCP ports

For LDAP Data Collector

  • TCP 389

For PasswordSecurity Collector

  • TCP 389/636

For PowerShell Data Collector

  • Randomly allocated high TCP ports

For Registry Data Collector

  • TCP 135-139
  • Randomly allocated high TCP ports

Least Privilege Model

A least privilege model can be configured based on your auditing needs and the data collection jobs you will be using. The following jobs and their corresponding data collectors can be run with a least privilege permissions model.

1-AD_Scan Job Permissions

The ADInventory Data Collector in the .Active Directory Inventory > 1-AD_Scan Job has the following minimum requirements, which must be configured at the Domain level in Active Directory:

  • Read access to directory tree

  • List Contents & Read Property on the Deleted Objects Container

    NOTE: See the Microsoft Searching for Deleted Objects article and the Microsoft Dsacls article for additional information.

AD_WeakPasswords Job Permissions

The PasswordSecurity Data Collector in the 2.Users > AD_WeakPasswords Job has the following minimum requirements:

  • At the domain level:

    • Read
    • Replicating Directory Changes
    • Replicating Directory Changes All
    • Replicating Directory Changes in a Filtered Set
    • Replication Synchronization

AD_CPassword Job Permissions

While the PowerShell Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD_CPasswords job. The minimum requirements for running this job are:

  • Read access to SYSVOL on the targeted Domain Controller(s) and all of its children

AD_GroupPolicy Job Permissions

While the GroupPolicy Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD_GroupPolicy Job. The minimum requirements for running this job are:

  • Requires Read permissions on Group Policy Objects

AD_PasswordPolicies Job Permissions

While the LDAP Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD_PasswordPolicies Job. The minimum requirements for running this job are:

  • Requires Read permissions on the Password Settings Container

AD_DomainControllers Job Permissions

While the LDAP Data Collector and Active Directory Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD_DomainControllers Job. The minimum requirements for running this job are:

  • Read access to CN=Servers,%SITEDN% and its children
  • Read access to: %PARTITIONDNS% and its children
  • Read access to: %SCHEMADN%
  • Read access to: %SITESDN% and its children

See the Variable Definitions for variable definitions.

AD_DSRM Job Permissions

While the Registry Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD_DSRM Job. The minimum requirements for running this job are:

  • Requires read access to the following Registry key and its children:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa

AD_TimeSync Job Permissions

While the Registry Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD_TimeSync Job. The minimum requirements for running this job are:

  • Requires Read access to the following Registry keys and its children: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time

AD_DomainInfo Job Permissions

While the LDAP Data Collector and Active Directory Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > AD_DomainInfo Job. The minimum requirements for running this job, which must be configured at the Domain level in Active Directory, are:

  • Read access to: %DOMAINDN% and its children
  • Read access to: CN=System,%DOMAINDN% and its children
  • Read access to: %SITEDN% and its children
  • Read access to: %PARTITIONDNS% and its children

See the Variable Definitions for variable definitions.

AD_ActivityCollection Job Permission

The ADActivity Data Collector in the 6.Activity > 0.Collection > AD_ActivityCollection Job has the following minimum requirements:

  • Netwrix Activity Monitor API Access activity data
  • Netwrix Activity Monitor API Read
  • Read access to the Netwrix Activity Monitor Log Archive location

Variable Definitions

The following variables are referenced for Active Directory Least Privileged Models:

%PARTITIONDNS% is the distinguished name of the accessed partition; CN=Partitions,CN=Configuration,DC=contoso,DC=com

%SITEDN% is the distinguished name of the accessed site; CN=Sites,CN=Configuration,DC=contoso,DC=com

%CONFIGDN% is the distinguished name of the configuration naming context; CN=Configuration,DC=company,DC=com

%SCHEMADN% is the distinguished name of the accessed schema; CN=Schema,CN=Configuration,DC=company,DC=com

%DOMAINDN%" is the distinguished name of the accessed domain object; DC=company,DC=com