Audit Directory Service Access
Some detection rules require configuring audit policies to generate events when Active Directory objects are accessed. These audit policies apply exclusively to Domain Controllers, as other servers do not produce events related to Active Directory object modifications.
Caution: Enabling this audit policy can generate a high volume of events. Evaluate the audit policy in a group of servers to measure volume and filter unwanted events before deploying in the entire domain.
To enable Audit Directory Service Access on all Domain Controllers via Group Policy, administrators must enable the Audit Directory Service Access policy. Follow these steps to configure the audit policy via Advanced Audit Policy Configuration:
Computer Configuration >
Policies >
Windows Settings >
Security Settings >
Advanced Audit Policies Configuration >
Audit Policies >
DS Access >
Audit Directory Service Access (Success,Failure)
To enable this policy on a local machine, run the following command in an elevated command prompt:
auditpol.exe /set /subcategory:"Directory Service Access" /success:enable /failure:enable
When this audit policy is enabled, the following event IDs may be generated:
- 4661: A handle to an object was requested.
- 4662: An operation was performed on an object.
Use the following GitHub search to identify rules that use the events listed: