So, I went back and created a GPO that applies only to the file servers I’m 
trying to work with.  Set everything as I want it, applied the policy, did a 
gpupdate on the server, and no change.  Legacy object access still configured 
with success/failure, which means all subcategories are going as well.

I know everyone says modeling isn’t all that great, but I decided to run it 
anyway.  On the Summary tab, under Component Status, I have a yellow warning 
symbol, and this warning:

Component Status [Warning] hide<about:blank>
Component Name

Status

Group Policy Infrastructure

Success

802.3 Group Policy

Success

Audit Policy Configuration

Failed

Audit Policy Configuration failed due to the error listed below and failed to 
log resultant set of policy information.

The system cannot find the file specified.

Additional information may have been logged. Review the application event log 
on the domain controller on which the simulation was run for events between 
8/8/2014 2:31:44 PM and 8/8/2014 2:31:44 PM.


Registry

Success

Security

Success



I’m not sure what file it is talking about, but if it can’t find whatever file, 
then I would guess that it couldn’t apply the settings I want.  I’m going to 
try another new policy (this was an existing policy that I added to) just to 
see if it makes a difference, but does anyone have any idea what file is being 
referenced there?  There was nothing in the application log, either.


From: [email protected] [mailto:[email protected]] On 
Behalf Of Free, Bob
Sent: Friday, August 08, 2014 10:57 AM
To: [email protected]
Subject: RE: [NTSysADM] Setting auditing in local security policy

Modeling isn’t all it’s cracked up to be, actually, it’s really an epic fail 
IME. Only thing that is truly authoritative is auditpol.

I’ve experienced situations where well-intentioned people messed around in 3 or 
4 places not understanding all the subtleties and had the system so royally 
messed up that everything had to be cleared and started over.

I’d recommend familiarizing yourself with the following:

http://blogs.technet.com/b/askds/archive/2011/03/11/getting-the-effective-audit-policy-in-windows-7-and-2008-r2.aspx
http://blogs.technet.com/b/askds/archive/2011/03/10/global-object-access-auditing-is-magic.aspx
http://support.microsoft.com/kb/2573113 (basically echos what the askds blog 
says)

http://www.ultimatewindowssecurity.com/blog/default.aspx?p=aa6c16dc-8bb8-40e3-aac9-d2c7eaa6c5f6

Summary from the last link is pretty succinct:

Where does all of this leave us?  Here are my Best Practices/Commandments for 
Win2008R2/Win7 Audit Policy Configuration:

  1.  Do not use Local Security Policy
  2.  Do not use auditpol /set
  3.  Use group policy objects in AD to configure audit policy
  4.  Always enable “Audit: Force audit policy subcategory settings (Windows 
Vista or later) to override audit policy category settings” and, for Win2008R2+ 
systems, ignore the 9 legacy audit categories.
  5.  Configure all of the advanced audit policy subcategories even if it is 
just to explicitly disable them
  6.  Do not use Local Security Policy, Group Policy Results Wizard, RSOP or 
gpresults to verify what your true audit policy is
  7.  Use only “auditpol /get /category:*” to verify what your true audit 
policy is on a given system
  8.  Monitor for 4719 where user is not the system itself.  This indicates 
someone is temporarily overriding your official audit policy defined in AD 
GPOs.  Terminate them!  Seriously though, it is indicative of something bad.




From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Heaton, Joseph@Wildlife
Sent: Friday, August 08, 2014 9:10 AM
To: '[email protected]'
Subject: RE: [NTSysADM] Setting auditing in local security policy

No, I just did a modeling, with the account I’m logging into the server with, 
and there are no auditing settings at all being applied through GPO to that box 
for me.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Sean Martin
Sent: Friday, August 08, 2014 7:55 AM
To: [email protected]<mailto:[email protected]>
Subject: Re: [NTSysADM] Setting auditing in local security policy

No chance that another gpo is being applied?

- Sean

On Aug 8, 2014, at 6:50 AM, "Heaton, Joseph@Wildlife" 
<[email protected]<mailto:[email protected]>> wrote:
Yes, pretty much what I’ve been trying to do.  But it just doesn’t seem to want 
to hold the settings.  We only need two sub-categories, so I left the basic 
auditing set to Success/Failure, and in the sub-categories, I set just the two 
that I need, leaving the rest at No Auditing.  But, if I go to a command prompt 
and run  auditpol.exe /get /category:*, it shows that all the subcategories are 
set to Success/Failure.  And I’m still getting tons of the 5156 events in the 
security log.  I even verified that I have the setting under Local Policies: 
Security Options:  “Audit: Force audit policy subcategory settings to override 
audit policy category settings” set to Enabled.  Even if I change the basic to 
No Auditing, if I close and reopen the Local Policy, it shows back up.

I know I forgot to mention it before, but the servers in question are Server 
2012 R2, in case there’s differences.


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Sean Martin
Sent: Thursday, August 07, 2014 9:36 PM
To: [email protected]<mailto:[email protected]>
Subject: Re: [NTSysADM] Setting auditing in local security policy

No idea if this is your answer, but I recently had to modify our audit policy 
to disable the filtering platform connection sub-category. Under Local 
Policy/Audit Policy, I left object access set to success/failure, and then 
under advanced audit policy settings/object access, I configured each option 
but left the success/failure option unchecked for filtering platform 
connection, which set it to no auditing.

- Sean

On Aug 7, 2014, at 8:13 PM, "Heaton, Joseph@Wildlife" 
<[email protected]<mailto:[email protected]>> wrote:
I’m having a horrible time trying to get the right items audited.  Started out 
with a GP, setting the basic auditing setting of Object Access to Success, 
Failure.  Unfortunately, this filled my security log with event id 5156 
entries.  Did some research, and found these entries were from auditing of 
Filtering Platform Connection, which I don’t need audited.  Figured out exactly 
what I do need audited, which is File Share and Handle Manipulation.  Now, I 
can’t get these settings to stick.  I’ve disabled all settings in the GPO that 
set the basic auditing, and on the file servers themselves, I’ve made sure that 
the basic Object Access is set to No Auditing, and the advanced settings are 
set to Success, Failure.

On one server, when these are set, I reboot, and the basic setting is back to 
Success, Failure, which then enables all the subcategories as well.  On the 
other server, when I look at Local Security Policy, it looks like things are 
correct, but when I go to a command line and use:  auditpol.exe /get 
/category:*, it shows Object Access set to No Auditing for everything.

Anyone have any advice?

Joe Heaton
Enterprise Server Support
Information Technology Operations Branch
Data and Technology Division
CA Department of Fish and Wildlife
1807 13th Street, Suite 201
Sacramento, CA  95811
Desk:  (916) 323-1284<tel:%28916%29%20323-1284>


________________________________
PG&E is committed to protecting our customers' privacy.
To learn more, please visit http://www.pge.com/about/company/privacy/customer/
________________________________

Reply via email to