How to configure granular audit policies for Logon Auditing
How to configure granular audit policies for Logon Auditing (Windows Vista or later)?
In Windows Server 2008 R2 and Server 2012, granular audit policies are integrated with the Group Policies, so you can apply them via a Group Policy Object (GPO) or Local Security Policies.
Applying Granular Audit Policies via Local Policies
To apply granular audit policies via Local Policies, perform the following:
-
On a monitored server, open the Local Security Policy snap-in (navigate to Start -> Run and type
secpol.msc). -
Navigate to Security Settings -> Local Policies -> Security Options and locate the Audit: Force audit policy subcategory settings (Windows Vista or later) policy.
-
Double-click this policy and select the Enabled option.
-
Navigate to Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies.
-
Set the subcategories below to Success and Failure:
LogonLogoff -> Audit Other Logon/Logoff EventsLogonLogoff -> Audit LogonLogonLogoff -> Audit LogoffAccount Management -> Audit User Account Management
-
Update your Group Policies by executing the
gpupdate /forcecommand in the command line interface.Note: You can check your current effective settings by executing the following command:
gpupdate /force
auditpol /get /category:* -
In Netwrix Logon Reporter, navigate to the Advanced tab. Select the Enable granular audit policies checking option and click Apply.
Applying Granular Audit Policies via Group Policies
To apply a granular audit policy configuration via a Group Policy Object (GPO), you must have a Windows Server 2008 R2 domain controller or member server with the Group Policy Management Console installed.
For instructions on how to do this, refer to the following technical article by Microsoft: Advanced Security Audit Policy Step-by-Step Guide