One unwanted change to Active Directory’s Organizational Units can affect the way your organization is able to function. For instance, if someone unintentionally deletes an Organizational Unit containing users, these users will no longer be able to logon to the system. In this article, we’ll show you how to audit changes made to Organizational Units both natively and using LepideAuditor – an Active Directory change auditing solution
Do the following to enable the auditing of Organizational Unit changes
1. Open Group Policy Management Console.
2. In the left navigation pane, go to the domain, and select a customized Group Policy Object in “Domain Controllers” node. (We recommend you to make such changes only in the customized GPOs and not in the default policies).
You can also create a new policy by right-clicking and selecting “Create a GPO in this domain, and Link it here…” option in the context menu.
4. Right-click the already existing or new GPO, and select “Edit” option from the context menu. It opens Group Policy Management Editor.
5. In the left navigation pane, expand the nodes to navigate through “Computer Configuration” ➔ “Policies” ➔ “Windows Settings” ➔ “Security Settings” ➔ “Advanced audit policy configuration” ➔ “Audit Policies”.
Click “DS Access” node to list all of its policies in the right panel.
6. Double-click “Audit Directory Service access” policy to access its properties.
7. Configure it for both “Success” and “Failure” audit events.
8. Similarly, enable “Audit Directory Service Changes” by configuring it for both “Success” and “Failure” audit events.
9. Close “Group Policy Management Editor” window. It takes you back to “Group Policy Management Console”.
10. Select the GPO under “Domain Controllers” group, which you have just modified in previous steps.
11. In “Security Filtering” section of the right pane, click “Add” to apply this GPO to all Active Directory objects. It shows “Select User, Computer, or Group” window.
12. Type “Everyone” to apply this GPO to all objects.
13. Click “Check Names” to validate the entry and click “OK” to add it.
14. It takes you back to “Group Policy Management Console”. Now close this window.
15. After applying the GPO to all objects, you have to update the Group Policies in the entire forest. To do it, execute the following command either in “Run” dialog box or at Command Prompt. Please start any of these utilities with administrative privileges.
After enabling the auditing of Active Directory for auditing, let’s select what we want to audit:
1. Go to Start Menu or “Control Panel” and access “Administrative Tools”.
2. Open “ADSI Edit” window.
3. Right-click “ADSI Edit” node in the left navigation pane and click “Connect To” option.
4. In “Connection Settings” window, select “Default naming context” In “Select a well known Naming Context” drop-down menu.
5. Click “OK” to conenct to “Default Naming Context”. It takes you back to “ADSI Edit” window.
6. Double-click the root node “Default Naming Context” to expand and access its sub-nodes.
7. Right-click the top node titled “DC=www,DC=domain,DC=com” and click “Properties”.
8. In “Properties”, switch to “Security” tab and click “Advanced” button to access “Advanced Security Settings for www”.
9. Switch to “Auditing” tab.
10. Click “Add” to add a new auditing entry. It shows “Auditing entry for www” on the screen.
11. Click “Select a Principal” link. It shows “Select User, Computer, Service Account or Group” window.
12. Type “Everyone” in the text box to audit the changes made by all Active Directory objects in the Organizational Units. You can enter the name of user or group to audit changes made by them only.
13. Click “Check Names” to verify the entry and Click “OK” to add it.
14. Click “OK”. It takes you back to “Auditing Entry for www” window, which now shows “Everyone”.
15. Enter “All” “Type” box to audit both successful and failed events.
16. Select “This object and all descendent objects” in the “Applies to” field. It enables the auditing on the descendant objects of Organizational Units also.
17. Select “Full Control” in the “Permissions” to audit everything.
18. Click “Apply” and "OK".
19. Close the console
After configuring auditing, open Event Viewer. Search security log for following event IDs.
- Event ID 5136: A directory service object (Organizational Unit) was modified.
- Event ID 5137: A directory service object (Organizational Unit) was created.
- Event ID 5139: A directory service object (Organizational Unit) was moved.
- Event ID 5141: A directory service object (Organizational Unit) was deleted.
In these events’ types, you can see who created, modified, deleted, or changed permissions of a GPO. The following screenshot shows an OU creation event (5137). You can get information like Username, Event time, new OU’s name in this window.
You can scroll down in the event to view the name of the created organizational unit.
The following screenshot displays the log of multiple events like 5141 for deleted organizational unit and 5136 for modified organizational units.
Using LepideAuditor for Active Directory to audit OU changes
In large organizations, native auditing can generate a lot of noise, and it can be difficult to find the required events from the multiple Gigabytes of event logs. Interpreting information from event logs is also very difficult. LepideAuditor audits all Active Directory changes to help you get the answers to the four key IT auditing questions – who, what, when and where.
With these predefined reports, you can do a detailed investigation by creating a long audit trail of events. The following screenshot shows all changes made to your Organizational Units. You can add real-time alerts to be received via email and through the LepideAuditor App:
The trial version of this Active Directory change auditing solution is available free for download.
- How to identify the source of Account Lockouts in Active Directory
- How to Audit Successful Logon/Logoff and Failed Logons in Active Directory
- How to enable the Security Auditing of Active Directory
- How to track changes made in Active Directory
- How to delegate rights to “Unlock account”
- How to track Privileged Users' Activities in Active Directory