Skip to main content

Windows Server

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • The Remote Registry and the Windows Management Instrumentation (WMI) service must be started. See the Enable Remote Registry and Windows Management Instrumentation Services topic and the Configure Windows Registry Audit Settings topic for additional information.

    • The following advanced audit policy settings must be configured:

      • The Audit: Force audit policy subcategory settings (Windows 7 or later) security option must be enabled.
      • For Windows Server 2008—The Object Access, Account Management, and Policy Change categories must be disabled while the Security Group Management, User Account Management, Handle Manipulation, Other Object Access Events, Registry, File Share, and Audit Policy Change subcategories must be enabled for "Success".
      • For Windows Server 2008 R2 / Windows 7 and above—Audit Security Group Management, Audit User Account Management, Audit Handle Manipulation, Audit Other Object Access Events, Audit Registry, Audit File Share, and Audit Audit Policy Changeadvanced audit policies must be set to "Success".
      • See the Configure Local Audit Policies topic and the Configure Advanced Audit Policies topic for additional information.
    • The following legacy audit policies can be configured instead of advanced: Audit object access, Audit policy change, and Audit account management must be set to "Success".

    • The Enable Persistent Time Stamp local group policy must be enabled. This policy should be configured manually since Auditor does not enable it automatically. See the Configure Enable Persistent Time Stamp Policy topic for additional information.

    • The Application, Security, and System event log maximum size must be set to 4 GB. The retention method must be set to “Overwrite events as needed”. See the Adjusting Event Log Size and Retention Settings topic for additional information.

    • For auditing scheduled tasks, the Microsoft-Windows-TaskScheduler/Operational event log must be enabled and its maximum size must be set to 4 GB. The retention method of the log must be set to “Overwrite events as needed”.

    • For auditing DHCP, the Microsoft-Windows-Dhcp-Server/Operational event log must be enabled and its maximum size must be set to 4 GB. The retention method of the log must be set to “Overwrite events as needed”. See the Adjust DHCP Server Operational Log Settings topic for additional information.

    • For auditing DNS, the Microsoft-Windows-DNS-Server/Audit event log must be enabled and its maximum size must be set to 4 GB. The retention method of the log must be set to “Overwrite events as needed”.

    • The following inbound Firewall rules must be enabled:

      • Remote Event Log Management (NP-In)
      • Remote Event Log Management (RPC)
      • Remote Event Log Management (RPC-EPMAP)
      • Windows Management Instrumentation (ASync-In)
      • Windows Management Instrumentation (DCOM-In)
      • Windows Management Instrumentation (WMI-In)
      • Network Discovery (NB-Name-In)
      • File and Printer Sharing (NB-Name-In)
      • Remote Service Management (NP-In)
      • Remote Service Management (RPC)
      • Remote Service Management (RPC-EPMAP)
      • Performance Logs and Alerts (DCOM-In)
      • Performance Logs and Alerts (TCP-In)
    • If the audited servers are behind the Firewall, review the list of protocols and ports required for Netwrix Auditor and make sure that these ports are opened. See the Windows Server Ports topic for additional information.

    • For auditing removable storage media, two Event Trace Session objects must be created. See the Configure Removable Storage Media for Monitoring topic for additional information.

    • If you want to use Network traffic compression, make sure that the Auditor console computer is accessible by its FQDN name.

    • For auditing IIS:

      • The Remote Registry service must be running and its Startup Type must be set to "Automatic".
      • The Microsoft-IIS-Configuration/Operational log must be enabled and its maximum size must be set to 4 GB. The retention method of the log must be set to “Overwrite events as needed”.

Whatever method you choose to configure Windows Server for auditing (manual or automated), also remember to do the following:

  1. Configure Data Collecting Account, as described in the Data Collecting Account topic.
  2. Configure required protocols and ports, as described in the Windows Server Ports topic.

Exclude Monitored Objects

You can fine-tune Netwrix Auditor by specifying data that you want to exclude from the Windows Server monitoring scope.

Follow the steps to exclude data from the Windows Server monitoring scope:

Step 1 – Navigate to the %Netwrix Auditor installation folder%\Windows Server Auditing folder.

Step 2 – Edit the *.txt files, based on the following guidelines:

  • Each entry must be a separate line.
  • Wildcards (* and ?) are supported. A backslash () must be put in front of (*), (?), (,), and () if they are a part of an entry value.
  • Lines that start with the # sign are treated as comments and are ignored.
FileDescriptionSyntax
omitcollectlist.txtContains a list of objects and their properties to be excluded from being monitored. If you want to restart monitoring these objects, remove them from the omitcollectlist.txt and run data collection at least twice.monitoring plan name,server name,class name,property name,property value class name is a mandatory parameter, it cannot be replaced with a wildcard. property name and property value are optional, but cannot be replaced with wildcards either. For example: #*,server,MicrosoftDNS_Server `````` #*,*,StdServerRegProv
omiterrors.txtContains a list of errors/warnings to be omitted from logging to the Netwrix Auditor System Health event log.monitoring plan name,server name,error text For example: *,productionserver1.corp.local,*Access is denied*
omitreportlist.txtContains a list of objects to be excluded from reports and Activity Summary emails. In this case audit data is still being collected.monitoring plan name,who,where,object type,what,property name For example: *,CORP\\jsmith,*,*,*,*
omitsitcollectlist.txtContains a list of objects to be excluded from State-in-time reports.monitoring planname,server name,class name,property name,property value class name is a mandatory parameter, it cannot be replaced with a wildcard. property name and property value are optional, but cannot be replaced with wildcards either. For example: *,server,MicrosoftDNS_Server *,*,StdServerRegProv
omitstorelist.txtContains a list of objects to be excluded from being stored to the Audit Archive and showing up in reports. In this case audit data is still being collected.monitoring plan name,who,where,object type,what,property name For example: *,*,*,Scheduled task,Scheduled Tasks\\User_Feed_Synchronization*,*

Monitored Objects

This section lists Windows Server components and settings whose changes Netwrix Auditor can monitor.

When monitoring a Windows Server, Netwrix Auditor needs to audit some registry settings. See the Windows Server Registry Keys section for additional information. If you want Netwrix Auditor to audit custom registry keys, see the Monitoring Custom Registry KeysMonitoring Custom Registry Keystopic for additional information.

In the table below, double asterisks (**) indicates the components and settings for which the Who value is reported as “Not Applicable”.

Object typeAttributes
General Computer Settings
Computer- System state changed to Started - System state changed to Stopped. Reason: Reason type - System state changed to Stopped. Reason: unexpected shutdown or system failure
Computer Name- Computer Description - Name - Domain
Environment Variables- Type - Value
Event Log- Event Log Cleared
General- Caption - Organization - Registered User - Serial Number - Service Pack** - Version**
Remote- Enable Remote Desktop on this computer
Startup and Recovery- Automatically Restart - Dump File - Dump Type - Overwrite any existing file - Send Alert - System Startup Delay - Write an Event
System Time- System time changed from ... to ... - Time zone changed Not supported on Windows Server 2008 SP2 and Windows Server 2008 R2.
Add / Remove Programs
Add or Remove Programs- Installed For** - Version
Services
System Service- Action in case of failed service startup - Action in case of service stopping - Allow service to interact with desktop - Caption - Created - Deleted - Description - Name - Path to executable - Service Account - Service Type - Start Mode - Error Control
Audit Policies
Local Audit Policy- Added Audit settings Only for the Global Object Access Auditing advanced policies. - Successful audit enabled/disabled - Failure audit enabled/disabled
Per-User Local Audit Policy- Success audit include added - Success audit include removed - Failure audit include added - Failure audit include removed - Success audit exclude added - Success audit exclude removed - Failure audit exclude added - Failure audit exclude remove
Hardware
Base Board**- Hosting Board - Status - Manufacturer - Product - Version - Serial Number
BIOS**- Manufacturer - Version
Bus**- Bus Type - Status
Cache Memory**- Configuration Manager Error Code - Last Error Description - Last Error Code - Purpose - Status
CD-ROM Drive**- Configuration Manager Error Code - Last Error Description - Last Error Code - Media Type - Name - SCSI Bus - SCSI Logical Unit - SCSI Port - SCSI Target ID - Status
Disk Partition**- Primary Partition - Size (bytes) - Starting offset (bytes)
Display Adapter**- Adapter RAM (bytes) - Adapter Type - Bits/Pixel - Configuration Manager Error Code - Driver Version - Installed Drivers - Last Error Description - Last Error Code - Refresh Rate - Resolution - Status
DMA**- Status
Floppy Drive**- Configuration Manager Error Code - Last Error Description - Last Error Code - Status
Hard Drive**- Bytes/Sector - Configuration Manager Error Code - Interface Type - Last Error Description - Last Error Code - Media Loaded - Media Type - Model - Partitions - SCSI Bus - SCSI Logical Unit - SCSI Port - SCSI Target ID - Sectors/Track - Size (bytes) - Status - Total Cylinders - Total Heads - Total Sectors - Total Tracks - Tracks/Cylinder
IDE**- Configuration Manager Error Code - Description - Last Error Description - Last Error Code - Status
Infrared**- Configuration Manager Error Code - Last Error Description - Last Error Code - Status
Keyboard**- Configuration Manager Error Code - Description - Last Error Description - Last Error Code - Layout - Name - Status
Logical Disk**- Description - File System - Size (bytes) - Status
Monitor**- Configuration Manager Error Code - Last Error Description - Last Error Code - Monitor Type - Status
Network Adapter- Adapter Type * - Configuration Manager Error Code - Default IP Gateway * - DHCP Enabled* - DHCP Server - DNS Server Search Order - IP Address * - Last Error Description - Last Error Code - MAC Address - Network Connection Name - Network Connection Status - Service Name - Status * — indicates the properties whose changes may not be reported correctly, displaying "Who" (i.e. initiator's account) as System.
Network Protocol**- Description - Status
Parallel Ports**- Configuration Manager Error Code - Last Error Description - Last Error Code - Status
PCMCIA Controller**- Configuration Manager Error Code - Last Error Description - Last Error Code - Status
Physical Memory**- Capacity (bytes) - Status - Manufacturer - Memory Type - Speed - Part Number - Serial Number
Pointing Device**- Configuration Manager Error Code - Double Click Threshold - Handedness - Hardware Type - Last Error Description - Last Error Code - Number of buttons - Status
Printing- Comment** - Hidden** - Local** - Location** - Name** - Network** - Port Name** - Printer error information - Published** - Shared** - Share Name** - Status
Processor**- Configuration Manager Error Code - Last Error Description - Last Error Code - Max Clock Speed (MHz) - Name - Status
SCSI**- Configuration Manager Error Code - Description - Last Error Description - Last Error Code - Status
Serial Ports**- Configuration Manager Error Code - Last Error Description - Last Error Code - Maximum Bits/Second - Name - Status
Sound Device**- Configuration Manager Error Code - Last Error Description - Last Error Code - Status
System Slot**- Slot Designation - Status
USB Controller**- Configuration Manager Error Code - Last Error Description - Last Error Code - Name - Status
USB Hub**- Configuration Manager Error Code - Last Error Description - Last Error Code - Name - Status
DHCP configuration
If the DHCP server runs on Windows Server 2008 (or below), then the Who value for DHCP server configuration events is reported as “Not Applicable”.
Server role- Added - Removed
Server settings- Type: - IPv4 - IPv4 Filters - IPv6 - Action: - Modified
DHCP scope- Type: - IPv4 - Multicast IPv4 - Superscope for IPv4 - IPv6 - Action: - Added - Removed - Modified - Moved
DHCP Reservation- Type: - IPv4 - IPv6 - Action: - Added - Removed - Modified
DHCP Policy- Type: - IPv4 - IPv4 server-wide - Action: - Added - Removed - Modified - Renamed
Removable media
Removable Storage Media**Netwrix Auditor does not report on floppy/optical disk and memory card storage medias. For removable storages, the When value reports actual time when a change was made and/or a target server was started. - Device class: - CD and DVD - Floppy Drives - Removable Disk - Tape Drives - Windows Portable Devices When the Audit Object Access local audit policy and/or the Audit Central Access Policy Staging \ Audit Removable Storage advanced audit policies are enabled on the target server, the gpupdate /force command execution issues removable storage restart. These actions are disclosed in Netwrix Auditor reports, search, and activity summaries. Note that these actions are system, not user-effected.
Scheduled Tasks
Scheduled Task- Account Name - Application - Comment - Creator - Enabled - Parameters - Triggers
Local Users and Groups
Local Group- Description - Name - Members
Local User- Description - Disabled/Enabled - Full Name - Name - User cannot change password - Password Never Expires - User must change password at next logon
DNS Configuration
The Who value will be reported for DNS configuration settings only if the DNS server runs on Windows Server 2012 R2. See the following Microsoft article for additional information: Update adds query logging and change auditing to Windows DNS servers.
DNS Server- Address Answer Limit - Allow Update - Auto Cache Update - Auto Config File Zones - Bind Secondaries - Boot Method - Default Aging State - Default No Refresh Interval - Default Refresh Interval - Disable Auto Reverse Zones - Disjoint Nets - Ds Available - Ds Polling Interval - Ds Tombstone Interval - EDns Cache Timeout - Enable Directory Partitions - Enable Dns Sec - Enable EDns Probes - CD-ROM D Enable Netmask Ordering - Event Log Level - Fail On Load If Bad Zone Data - Forward Delegations - Forwarders - Forwarding Timeout - Is Slave - Listen Addresses - Log File Max Size - Log File Path - Log Level - Loose Wildcarding - Max Cache TTL - Max Negative Cache TTL - Name Check Flag - No Recursion - Recursion Retry - Recursion Timeout - Round Robin - Rpc Protocol - Scavenging Interval - Secure Cache Against Pollution - Send Port - Server Addresses
DNS Zone- Aging State - Allow update - Auto created - Data file name - Ds integrated - Expires after - Forwarder slave - Forwarder timeout - Master servers - Minimum TTL - No refresh interval - Notify - Notify servers - Owner name - Paused - Primary server - Refresh interval - Responsible person - Retry interval - Reverse - Scavenge servers - Secondary servers - Secure secondaries - Shutdown - TTL - User NB stat - Use WINS - Zone type
DNS Resource Records
The Who value will be reported for DNS Resource Records only if the DNS server runs Windows Server 2012 R2. See the following Microsoft article for additional information: Update adds query logging and change auditing to Windows DNS servers.
DNS AAAA- Container name - IPv6 Address - Owner name - Record class - TTL - Zone type
DNS AFSDB- Container name - Owner name - Server name - Server subtype - Record class - TTL - Zone type
DNS ATM A- ATM Address - Container name - Format - Owner name - Record class - TTL - Value - Zone type
DNS A- Container name - IP Address - Owner name - Record class - TTL - Zone type
DNS CNAME- Container name - FQDN for target host - Owner name - Record class - TTL - Zone type
DNS DHCID- Container name - DHCID (base 64) - Owner name - Record class - TTL - Zone type
DNS DNAME- Container name - FQDN for target domain - Owner name - Record class - TTL - Zone type
DNS DNSKEY- Algorithm - Container name - Key type - Key (base 64) - Name type - Owner name - Protocol - Record class - Signatory field - TTL - Zone type
DNS DS- Algorithm - Container name - Data - DigestType - Key tag - Owner name - Record class - TTL - Zone type
DNS HINFO- Container name - CPU type - Operating system - Owner name - Record class - TTL - Zone type
DNS ISDN- Container name - ISDN phone number and DDI - ISDN subaddress - Owner name - Record class - TTL - Zone type
DNS KEY- Algorithm - Container name - Key type - Key (base 64) - Name type - Owner name - Protocol - Record class - Signatory field - TTL - Zone type
DNS MB***- Container name - Mailbox host - Owner name - Record class - TTL - Zone type
DNS MD- Container name - MD host - Owner name - Record class - TTL - Zone type
DNS MF- Container name - MF host - Owner name - Record class - TTL - Zone type
DNS MG- Container name - Member mailbox - Owner name - Record class - TTL - Zone type
DNS MINFO- Container name - Error mailbox - Owner name - Responsible mailbox - Record class - TTL - Zone type
DNS MR- Container name - Owner name - Replacement mailbox - Record class - TTL - Zone type
DNS MX- Container name - FQDN of mail server - Mail server priority - Owner name - Record class - TTL - Zone type
DNS NAPTR- Container name - Flag string - Order - Owner name - Preference - Record class - Regular expression string - Replacement domain - Service string - TTL - Zone type
DNS NS- Container name - Name servers - Owner name - TTL
DNS NXT- Container name - Next domain name - Owner name - Record class - Record types - TTL - Zone type
DNS PTR- Container name - Owner name - PTR domain name - Record class - TTL - Zone type
DNS RP- Container name - Mailbox of responsible person - Optional associated text (TXT) record - Owner name - Record class - TTL - Zone type
DNS RRSIG- Algorithm - Container name - Key tag - Labels - Original TTL - Owner name - Record class - Signature expiration (GMT) - Signature inception (GMT) - Signature (base 64) - Signer's name - TTL - Type covered - Zone type
DNS RT- Container name - Intermediate host - Owner name - Preference - Record class - TTL - Zone type
DNS SIG- Algorithm - Container name - Key tag - Labels - Original TTL - Owner name - Record class - Signature expiration (GMT) - Signature inception (GMT) - Signature (base 64) - Signer's name - TTL - Type covered - Zone type
DNS SRV- Container name - Host offering this service - Owner name - Port number - Priority - Record class - TTL - Weight - Zone type
DNS TEXT- Container name - Owner name - Record class - Text - TTL - Zone type
DNS WINS- Cache time-out - Container name - Do not replicate this record - Lookup time-out - Owner name - Record class - Wins servers - Zone type
DNS WKS- Container name - IP address - Owner name - Protocol - Record class - Services - TTL - Zone type
DNS X25- Container name - Owner name - Record - Record class - TTL - X.121 PSDN address - Zone type
File Shares
Share- Access-based enumeration - Caching - Description - Enable BranchCache - Encrypt data access - Folder path - Share permissions - User limit

Windows Server Registry Keys

If you want to monitor changes to system components on a Windows Server, make sure that Windows Registry audit settings are configured on that Windows server.

This refers to the following keys:

  • HKEY_LOCAL_MACHINE\SOFTWARE
  • HKEY_LOCAL_MACHINE\SYSTEM
  • HKEY_USERS.DEFAULT

For these keys and subkeys, the following advanced permissions must be audited ("Successful" audit type required):

  • Set Value
  • Create Subkey
  • Delete
  • Write DAC
  • Write Owner

The below is the full list of keys (and subkeys) involved in Windows Server auditing.

| | | | -------------- | ------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ----- | | Hardware | - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces( | .*) - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network{4D36E972-E325-11CE-BFC1-08002BE10318}( | .*) - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class{4D36E972-E325-11CE-BFC1-08002BE10318}( | .*) - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services( | .*) | | General | - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl( | .*) - HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CrashControl( | .*) - HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\CrashControl( | .*) - HKEY_LOCAL_MACHINE\Software\WOW6432NODE\Microsoft\Windows NT\CurrentVersion( | .*) - HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion( | .*) | | Software | - HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL( | .*) - HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL( | .*) | | Services | - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services( | .*) - HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services( | .*) - HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services( | .*) | | RemovableMedia | - SYSTEM\CurrentControlSet\Enum |

Consider that audit data for the registry keys themselves will not appear in Netwrix Auditor reports, alerts or search results, as it is only used as one of the sources for the Activity Records formation.

  • You can configure these settings automatically using Netwrix Auditor, as described in the Settings for Data Collection topic. Corresponding audit settings will be also applied automatically after you select a checkbox under Monitor changes to system components on the General tab in the Windows Server data source properties.

Audit settings will be automatically adjusted only for the keys/subkeys involved in the monitoring of selected components (granular adjustment). For example, if you selected Services, the program will adjust the audit settings for the following subkeys:

  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services(|\.*)

  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services(|\.*)

  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services(|\.*)

  • To configure the audit settings manually, refer to the Configure Windows Registry Audit Settings topic for additional information.

Monitoring Custom Registry Keys

Follow the steps to monitor custom registry keys.

Step 1 – On the computer where Auditor Server resides, navigate to %Netwrix Auditor installation folder%\Windows Server Auditing.

customregistrykeyentry

Step 2 – Edit the following parameters of the customregistrykeys.txt file:

monitoring plan name,server name,registry key name

For example:

#*,productionserver1.corp.local,HKEY_LOCAL_MACHINE\\SYSTEM\\RNG

Step 3 – Consider the following:

  • Each entry must be a separate line.
  • Wildcards (* and ?) are supported (except for the registry key name field). A backslash () must be put in front of (*), (?), (,), and () if they are a part of an entry value.
  • Lines that start with the # sign are treated as comments and are ignored.

customregistrykey

NOTE: In some cases, Who will be the system and When will be collection time, because there is no necessary event in the Security log with this path.

VM Template Cloning

While VM cloning is supported by Netwrix Auditor, an additional setup process should be taken into consideration before the deployment process.

Every monitored VM instance gets a unique ID assigned for monitoring and data collection purposes. To ensure proper operation, the VM template must be excluded from the monitoring scope beforehand. Omitting the VM template will allow Netwrix Auditor to assign unique IDs correctly and collect data as intended.

Follow the steps to add the template server to exclusions.

Step 1 – In main Netwrix Auditor menu, select Monitoring plans.

Step 2 – Select your Windows Server monitoring plan and click Edit.

Step 3 – Choose the AD Container containing the template VM and click Edit data source in the right pane.

Step 4 – In the left pane, select Containers and Computers.

Step 5 – Check the Exclude these objects checkbox and add the template VM by clicking Add Computer.

VM template server is added to exclusions and ready to use.