Skip to content

Here are the best practices for auditing Windows endpoints and Windows Server

Introduction

Auditing Windows endpoints and Windows Server is a critical aspect of maintaining a secure and compliant IT environment. By implementing best practices for auditing, you can ensure that your systems are monitored effectively, potential security incidents are detected early, and compliance requirements are met.

This guide provides a comprehensive overview of the best practices for auditing Windows operating systems. Whether you are managing a small network or a large enterprise, these recommendations will help you enhance the security and integrity of your Windows infrastructure.

INFO

To learn more about Tier 0, Tier 1, and Tier 2, please refer to my Asset Security article or the Microsoft Learn article.

Recommendation for Windows endpoints (Tier 2️⃣):

Audit Policy Category or SubcategorySuccessFailure
Account Logon: Audit Credential ValidationYesNo
Account Management: Audit Computer Account ManagementYesNo
Account Management: Audit Other Account Management EventsYesNo
Account Management: Audit Security Group ManagementYesNo
Account Management: Audit User Account ManagementYesNo
Detailed Tracking: Audit Process CreationYesNo
Logon and Logoff: Audit LogoffYesNo
Logon and Logoff: Audit LogonYesYes
Logon and Logoff: Audit Special LogonYesNo
Policy Change: Audit Audit Policy ChangeYesYes
Policy Change: Audit Authentication Policy ChangeYesNo
System: Audit IPsec DriverYesYes
System: Audit Security State ChangeYesYes
System: Audit Security System ExtensionYesYes
System: Audit System IntegrityYesYes

Recommendation for ⚡critical Windows endpoints (Tier 2️⃣):

Audit Policy Category or SubcategorySuccessFailure
Account Logon: Audit Credential ValidationYesYes
Account Logon: Audit Kerberos Authentication ServiceYesYes
Account Logon: Audit Kerberos Service Ticket OperationsYesYes
Account Logon: Audit Other Account Logon EventsYesYes
Account Management: Audit Computer Account ManagementYesYes
Account Management: Audit Other Account Management EventsYesYes
Account Management: Audit Security Group ManagementYesYes
Account Management: Audit User Account ManagementYesYes
Detailed Tracking: Audit DPAPI ActivityYesYes
Detailed Tracking: Audit Process CreationYesYes
Logon and Logoff: Audit Account LockoutYesNo
Logon and Logoff: Audit LogoffYesNo
Logon and Logoff: Audit LogonYesYes
Logon and Logoff: Audit Special LogonYesYes
Policy Change: Audit Audit Policy ChangeYesYes
Policy Change: Audit Authentication Policy ChangeYesYes
Policy Change: Audit MPSSVC Rule-Level Policy ChangeYesYes
System: Audit IPsec DriverYesYes
System: Audit Security State ChangeYesYes
System: Audit Security System ExtensionYesYes
System: Audit System IntegrityYesYes

Recommendation for Windows Server (Tier 1️⃣):

Audit Policy Category or SubcategorySuccessFailure
Account Logon: Audit Credential ValidationYesYes
Account Management: Audit Computer Account ManagementYesNo
Account Management: Audit Other Account Management EventsYesYes
Account Management: Audit Security Group ManagementYesYes
Account Management: Audit User Account ManagementYesYes
Detailed Tracking: Audit Process CreationYesNo
Logon and Logoff: Audit LogoffYesNo
Logon and Logoff: Audit LogonYesYes
Logon and Logoff: Audit Special LogonYesNo
Policy Change: Audit Audit Policy ChangeYesYes
Policy Change: Audit Authentication Policy ChangeYesNo
System: Audit IPsec DriverYesYes
System: Audit Security State ChangeYesYes
System: Audit Security System ExtensionYesYes
System: Audit System IntegrityYesYes

Recommendation for ⚡critical Windows Server / Domain Controller (Tier 0️⃣):

Audit Policy Category or SubcategorySuccessFailure
Account Logon: Audit Credential ValidationYesYes
Account Logon: Audit Kerberos Authentication ServiceYesYes
Account Logon: Audit Kerberos Service Ticket OperationsYesYes
Account Logon: Audit Other Account Logon EventsYesYes
Account Management: Audit Computer Account ManagementYesYes
Account Management: Audit Other Account Management EventsYesYes
Account Management: Audit Security Group ManagementYesYes
Account Management: Audit User Account ManagementYesYes
Detailed Tracking: Audit DPAPI ActivityYesYes
Detailed Tracking: Audit Process CreationYesYes
DS Access: Audit Directory Service AccessDCDC
DS Access: Audit Directory Service ChangesDCDC
Logon and Logoff: Audit Account LockoutYesNo
Logon and Logoff: Audit IPsec Main ModeYesYes
Logon and Logoff: Audit LogoffYesNo
Logon and Logoff: Audit LogonYesYes
Logon and Logoff: Audit Other Logon/Logoff EventsYesYes
Logon and Logoff: Audit Special LogonYesYes
Policy Change: Audit Audit Policy ChangeYesYes
Policy Change: Audit Authentication Policy ChangeYesYes
Policy Change: Audit MPSSVC Rule-Level Policy ChangeYesYes
System: Audit IPsec DriverYesYes
System: Audit Security State ChangeYesYes
System: Audit Security System ExtensionYesYes
System: Audit System IntegrityYesYes

Additional Information

These are 'Advanced Audit' settings, which can be found under:

Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration

These should not be mixed with the basic audit policies, as this can lead to conflicts. End-user devices should be considered when creating audit policies, even if they do not have the same priority as servers. Hacker attacks almost always start with workstation computers. Neglecting this important source of information can lead to significant losses. In addition, for all the above policy recommendations should the 'maximum log size' attribute be set.

To be found under:

Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Event Log
  • 💿 Maximum appIicatlon log size: 4,194,240 (kilobytes)
  • ⛔ Maximum security log size: 4,194,240 (kilobytes)
  • 🖥️ Maximum system log size: 4,194,240 (kilobytes)

However, it is important to know that this does not mean permanent storage of the logs. Depending on the amount of logs, they may be overwritten very quickly. For longer storage / archiving of the logs, a central log management is required (like 'Windows Event Collector'). However, it is not enough to collect the logs. They also need to be monitored regularly to detect irregular behavior.

The following are some standard events to look out for:

Event NameEvent ID
Logon Failures4624, 4771
Successful logons4624
Failures due to bad passwords4625
User Account Locked out4740
User Account Unlocked4767
User changed password4723
User Added to Privileged Group4728, 4732, 4756
Member added to a group4728, 4732, 4756 , 4761, 4746, 4751
Member removed from group4729, 4733, 4757, 4762, 4747, 4752
Security log cleared1102
Computed Deleted4743

Here you will find other event IDs that may be of interest depending on the machine being monitored. Microsoft Learn | Events to Monitor
This command can be used to display the PC's currently valid audit policies (elevated privileges required).

powershell
auditpol /get /category:*