5.2 Configuring Group Policy Monitoring

Change Guardian monitors the following in Group Policy:

  • Group policies objects

  • Preferences

  • Settings

  • Starter group policy objects

  • SYSVOL

This section provides the following information:

5.2.1 Implementation Checklist

Complete the following tasks to start monitoring Group Policy events:

5.2.2 Prerequisites

Ensure that you have completed the following:

5.2.3 Configuring GPO

Complete the following tasks to configure Change Guardian server to monitor GPO events:

NOTE:Ensure that you have the required permission to complete these tasks. Check with your network or system administrator for assistance.

Configuring SACLs for GPO

Configure SACL to generate events for operations that can result in, or are related to, changes in GPO data stored in Active Directory.

To configuration SACL:

  1. Log in as an administrator to the computer in the domain you want to configure.

  2. To open ADSI Edit configuration tool, run adsiedit.msc at the command prompt.

  3. Right-click ADSI Edit, and then select Connect to.

  4. In the Connection Settings window, specify the following:

    • Name as Default naming context.

    • Path to the domain to configure.

  5. In Connection Point, set Select a well known Naming Context to Default naming context.

  6. In the ADSI Edit window, expand Default naming context.

  7. Right-click the node under the connection point (begins with DC=), and select Properties.

  8. On the Security tab, click Advanced > Auditing > Add.

  9. Deselect the option Apply these auditing entries to objects and/or containers within this container only.

  10. Configure auditing to monitor every user:

    Condition

    Task

    If you are using Windows Server 2012 or later

    1. Click Select a principal and type everyone in Enter the object name to select.

    2. Specify the following options:

      • Type as All

      • Select Permissions as:

        • Delete

        • Create Organizational Unit objects

      • Select Properties as:

        • Write gPLink

        • Write gPOptions

    For Windows versions lower than 2012

    1. Type everyone in the Enter the object name to select field.

    2. Select Permissions as:

      • Delete

      • Create Sites Container objects

    3. Select Properties as:

      • Write gPLink

      • Write gPOptions

  11. In Connection Point, select Select a well known Naming Context, and Configuration.

  12. Expand Configuration.

  13. Right-click the node under the connection point (begins with CN=), and select Properties.

  14. On the Security tab, click Advanced > Auditing > Add.

  15. Configure auditing to monitor every user:

    Condition

    Task

    If you are using Windows Server 2012 or later

    1. Click Select a principal and type everyone in Enter the object name to select.

    2. Specify the following options:

      • Type as All

      • Select Permissions as:

        • Delete

        • Create Organizational Unit objects

      • Select Properties as:

        • Write gPLink

        • Write gPOptions

    For Windows versions lower than 2012

    1. Type everyone in the Enter the object name to select field.

    2. Select Permissions as:

      • Delete

      • Create Sites Container objects

    3. Select Properties as:

      • Write gPLink

      • Write gPOptions

  16. Deselect Apply these auditing entries to objects and/or containers within this container only.

  17. In Applies to or Apply onto, select This object and all descendant objects.

5.2.4 Categories of GPO Policies

Group Policy Objects: Policies about deleting and modifying group policies and domain policies

Group Policy Preferences: Policies about changes to local user and group preferences to GPO

Group Policy Settings: Policies about modifying software settings

Starter Group Policy Objects: Policies about creating, deleting, and modifying starter group policies

SYSVOL: Policies about changing Central Store and SYSVOL folder

For information about creating policies, see Creating Change Guardian Policies.

After creating policies, you can assign them to assets. For information about assigning policies, see Working with Policies.