6.4 Configuring Change History Reporting

DRA enables delegation of managed changes in an enterprise organization and Change Guardian (CG) enables monitoring for managed and unmanaged changes occurring in Active Directory. Integrating DRA and CG together provides:

  • Ability to see DRA delegated Assistant Administrator that made a change to Active Directory in CG events for changes made through DRA.

  • Ability to see recent change history for an object in DRA of both changes made through DRA and changes captured by CG that originated outside of DRA.

  • Changes made through DRA are designated as “Managed” changes in CG.

To configure DRA change history reporting, follow these steps:

Once you have completed the steps above for installing Change Guardian and configuring DRA and CG integration, users can generate and view UCH reports in the Web Console.

For more information, see Generating Change History Reports in the Directory and Resource Administrator User Guide.

6.4.1 Install the Change Guardian Windows Agent

Before you begin DRA and CG integration, install the Change Guardian Windows Agent. For more information, see the Change Guardian Installation and Administration Guide.

6.4.2 Add an Active Directory License key

You must add licenses for both the Change Guardian server and applications or modules you plan to monitor

Adding a License Key for the Server

You can either use the Administration Console or the command-line to add the Change Guardian server license key

Adding from the Administration Console

To add a license key using the Administration Console:

  1. In the Administration Console, click About > Licenses.

  2. In the Licenses section, click Add License.

  3. Specify the license key in Key.

    NOTE:After a license expires, you can add the license key by using only the command line.

  4. Click Save

Adding from the Command Line

To add a license key using the command line:

  1. Log in to the Change Guardian server as root.

  2. Change to the /opt/novell/sentinel/bin directory.

  3. Change to the novell user:

    su novell

  4. Run the softwarekey.sh script:

    ./softwarekey.sh
  5. Enter 1 to insert the license key.

  6. Specify the license key, then press Enter

Adding a License for Applications

Module Manager provides you information about licensed applications and allows you to import application licenses to Policy Editor.

When you install Change Guardian, all available applications are installed automatically on Policy Editor. However, you must add a new application to Policy Editor. To allow Change Guardian to start monitoring, import the license key for each application.

To add a new application to Module Manager:

  1. In Module Manager, click Install > From Local Directory.

To import a license:

  1. Log in to Policy Editor, click Change Guardian.

  2. Select Module Manager.

  3. Click Import License Key.

  4. Select the license key for the required application

6.4.3 Configure Active Directory

To configure Active Directory for Change History, reference the following sections:

Configuring the Security Event Log

Configure the security event log to ensure that Active Directory events remain in the event log until Change Guardian processes them.

To configure the security event log:

  1. Log in as an administrator to a computer in the domain that you want to configure.

  2. To open Group Policy Management Console, enter the following at the command prompt: gpmc.msc

  3. Open Forest > Domains > domainName> Domain Controllers.

  4. Right-click Default Domain Controllers Policy, and then click Edit.

    NOTE:Changing the default domain controllers policy is important because a GPO linked to the domain controller (DC) organizational unit (OU) with a higher link order can override this configuration when you restart the computer or run gpUpdate again. If your corporate standards do not allow you to modify the default domain controllers policy, create a GPO for your Change Guardian settings, add these settings to the GPO, and set it to have the highest link order in the Domain Controllers OU.

  5. Expand Computer Configuration > Policies > Windows Settings > Security Settings.

  6. Select Event Log and set:

    • Maximum security log size to 10240 KB (10 MB) or more

    • Retention method for security log to Overwrite events as needed

  7. To update policy settings, run the gpUpdate command at the command prompt.

To verify the configuration is successful:

  1. Open a command prompt as an administrator to the computer.

  2. Start Event Viewer: eventvwr

  3. Under Windows logs, right-click Security, and select Properties.

  4. Ensure that the settings show maximum log size of 10240 KB (10 MB) or more and that Overwrite events as needed is selected

Configuring AD Auditing

Configure AD auditing to enable logging of AD events in the security event log.

Configure Default Domain Controllers Policy GPO with Audit Directory service access to monitor both success and failure events.

To configure AD auditing:

  1. Log in as an administrator to a computer in the domain that you want to configure.

  2. To open Group Policy Management Console, run gpmc.msc at the command prompt.

  3. Expand Forest > Domains > domainName > Domain Controllers.

  4. Right-click Default Domain Controllers Policy, and click Edit.

    NOTE:Changing the default domain controllers policy is important because a GPO linked to the domain controller (DC) organizational unit (OU) with a higher link order can override this configuration when you restart the computer or run gpUpdate again. If your corporate standards do not allow you to modify the default domain controllers policy, create a GPO for your Change Guardian settings, add these settings to the GPO, and set it to have the highest link order in the Domain Controllers OU.

  5. Expand Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies.

    1. To configure AD and Group Policy, under Account Management, and Policy Change, select the following for each subcategory: Configure the following audit events, Success, and Failure.

    2. To configure only AD, under DS Access, select the following for each subcategory: Configure the following audit events, Success, and Failure.

  6. Click Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options, enable Force audit policy subcategory setting on the default domain policy.

  7. Under Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Audit Policy.

  8. Under Audit account management, Audit directory service access, and Audit policy change, select the following for each subcategory: Define these policy settings, Success, and Failure.

  9. To update policy settings, run the gpUpdate command at the command prompt.

For more information, see Monitoring Active Directory for Signs of Compromise in the Microsoft Documentation site.

Configuring User and Group Auditing

Configure user and group auditing to audit the following activities:

  • Logon and logoff activities of local users and Active Directory users

  • Local user settings

  • Local group settings

To configure user and group auditing:

  1. Log in as an administrator to a computer in the domain that you want to configure.

  2. Open Microsoft Management Console, select File > Add/Remove Snap-in.

  3. Select Group Policy Management Editor and click Add.

  4. In the Select Group Policy Object window, click Browse.

  5. Select Domain Controllers.FQDN, where FQDN is the Fully Qualified Domain Name for the domain controller computer.

  6. Select Default Domain Controllers Policy.

  7. In the Microsoft Management Console, expand Default Domain Controllers Policy FQDN > Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Audit Policy.

  8. Under Audit Account Logon Events and Audit Logon Events, select Define these policy settings, Success, and Failure.

  9. In the Microsoft Management Console, expand Default Domain Controllers Policy FQDN > Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Logon/Logoff.

  10. Under Audit Logon, select Audit Logon, Success, and Failure.

  11. Under Audit Logoff, select Audit Logoff, Success, and Failure.

  12. To update policy settings, run the gpupdate /force command at the command prompt

Configuring Security Access Control Lists

To monitor all changes of current and future objects inside Active Directory, configure the domain node.

To configure SACLs:

  1. Log in as an administrator to a computer in the domain that you want to configure.

  2. To open ADSI Edit configuration tool, run adsiedit.msc at the command prompt.

  3. Right-click ADSI Edit, and select Connect to.

  4. In the Connection Settings window, specify the following:

    • Name as Default naming context.

    • Path to the domain to configure.

    • If you are performing this step for the first time, select Default naming context.

    • If you are performing for the second time, select Schema.

    • If you are performing for the third time, select Configuration.

    NOTE:You must perform Step 4 through Step 11 three times, to configure connection points for Default naming context, Schema, and Configuration.

  5. In Connection Point, set Select a well known Naming Context to Default naming context.

  6. In the ADSI Edit window, expand Default naming context.

  7. Right-click the node under the connection point (begins with DC= or CN=), and click Properties.

  8. On the Security tab, click Advanced > Auditing > Add.

  9. In Applies to or Apply onto, select This object and all descendant objects.

  10. Configure auditing to monitor every user:

    1. Click Select a principal, and type everyone in Enter the object name to select.

    2. Specify the following options:

      • Type as All

      • Select Permissions as:

        • Write All Properties

        • Delete

        • Modify Permissions

        • Modify Owner

        • Create All Child Objects

          The other nodes related to child objects are selected automatically

        • Delete All Child Objects

          The other nodes related to child objects are selected automatically

  11. Deselect the option Apply these auditing entries to objects and/or containers within this container only.

  12. Repeat Step 4 through Step 11 two more times.

6.4.4 Create and Assign an Active Directory Policy

To create a policy:

  1. In Policy Editor, select one of the applications, such as Active Directory.

  2. Expand the list of policies and select the policy type you want to create. For example, select Active Directory Policies > AD Object.

  3. On the Configuration Policy screen, make the appropriate changes.

  4. (Conditional) If you want to enable the policy immediately, select Enable this policy revision now

To assign a policy or policy set to an asset:

  1. Click Change Guardian > Policy Assignment.

  2. Select an asset or asset group, and click Assign Policies.

  3. Select a policy set or policy, and click Apply.

    NOTE:You cannot assign policies using Asset Groups for the following asset types: Azure AD, AWS for IAM, Dell EMC, Microsoft Exchange, Microsoft Office 365, and NetApp

6.4.5 Manage Active Directory Domains

To configure a domain in DRA as a Managed domain, see Managing Active Directory Domains.

6.4.6 Enable Event Stamping in DRA

When AD Domain Services auditing is enabled, DRA events are logged as having been generated by either the DRA Service account or the Domain Access account if one is configured. Event Stamping takes this feature one step further by generating an additional AD DS event that identifies the assistant administrator who performed the operation.

For these events to be generated you must configure AD DS auditing and enable Event Stamping on the DRA Administration Server. When Event Stamping is enabled, you will be able to view the changes that assistant administrators make in Change Guardian Event reports.

  • To configure AD DS auditing, see the Microsoft reference AD DS Auditing Step-by-Step Guide.

  • To configure Change Guardian integration, see Configuring Unified Change History Servers.

  • To enable Event Stamping, open the Delegation and Configuration console as DRA Administrator, and do the following:

    1. Navigate to Configuration Management > Update Administration Server Options > Event Stamping.

    2. Select an object type, and click Update.

    3. Select an attribute to use for Event Stamping for that object type.

      DRA currently supports Event Stamping for users, groups, contacts, computers, and organizational units.

      DRA also requires that the attributes exist in the AD schema for each of your managed domains. You should be aware of this if you add managed domains after configuring Event Stamping. If you were to add a managed domain that does not contain a selected attribute, operations from that domain would not be audited with the Event Stamping data.

      DRA will be modifying these attributes so you should select attributes that are not used by DRA or any other application in your environment.

For more information about Event Stamping, see How Event Stamping Works.

6.4.7 Configure Unified Change History

The Unified Change History (UCH) Server feature enables you to generate reports for changes made outside of DRA.

Delegating the Unified Change History Server Configuration Powers

To manage Unified Change History Server, assign the Unified Change History Server Administration role or the applicable powers below to assistant administrators:

  • Delete Unified Change History Server Configuration

  • Set Unified Change History Configuration Information

  • View Unified Change History Configuration Information

To delegate Unified Change History Server powers:

  1. Click Powers in the Delegation Management node, and use the search objects feature to find and select the UCH powers that you want.

  2. Right-click one of the selected UCH powers and select Delegate Roles and Powers.

  3. Search for the specific user, group, or assistant administrator group that you want to delegate powers to.

  4. Use the Object Selector to find and add the objects that you want, and then click Roles and Powers in the Wizard.

  5. Click ActiveViews, and use the Object Selector to find and add the ActiveViews that you want.

  6. Click Next and then Finish to complete the delegation process.

Configuring Unified Change History Servers

To configure Unified Change History Servers:

  1. Log in to the Delegation and Configuration Console.

  2. Expand Configuration Management > Integration Servers.

  3. Right-click Unified Change History, and select New Unified Change History Server.

  4. Specify the UCH server name or IP address, port number, server type, and access account details in the Unified Change History configuration.

  5. Test the server connection and click Finish to save the configuration.

  6. Add additional servers as required.

6.4.8 Access Unified Change History Reports

To generate and view Unified Change History reports on Active Directory objects via Change Guardian, see Generating Change History Reports in the Directory and Resource Administrator User Guide.