20.6 Ensure 'Active Directory Group Policy objects are configured with proper audit settings' (STIG DC only)

Information

This policy setting ensures that the Active Directory Group Policy objects are configured with the proper audit settings.

The recommended STIG state for this setting is: Type - Fail Principal - Everyone and Access - Full Control

Note: These audit settings apply to this object and all descendant objects or Descendant groupPolicyContainer objects.

When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data.

The impact of missing audit data is related to the type of object. A failure to capture audit data for objects used by identification, authentication, or authorization functions could degrade or eliminate the ability to track changes to access policy for systems or data.

For Active Directory (AD), there are a number of critical object types in the domain naming context of the AD database for which auditing is essential. This includes the Group Policy objects. Because changes to these objects can significantly impact access controls or the availability of systems, the absence of auditing data makes it impossible to identify the source of changes that impact the confidentiality, integrity, and availability of data and systems throughout an AD domain. The lack of proper auditing can result in insufficient forensic evidence needed to investigate an incident and prosecute the intruder.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the audit settings for

Group Policy

objects to include at least the following: Type - Fail Principal - Everyone Access - Full Control and Inherited from - None

Note: These audit settings apply to this object and all descendant objects or Descendant groupPolicyContainer objects.

- Open

Active Directory Users and Computers

- Ensure

Advanced Features

is selected in the

View

menu
- Select

System

under the domain being reviewed
- Right-click

Policies

and select

Properties

- Select the

Security

tab
- Select the

Advanced

button
- Select the

Auditing

tab

Ensure at least the above auditing permissions are set.

Note: The three Success types listed below are defaults inherited from the Parent Object. Where Special is listed in the summary screens for Access, detailed Permissions are provided for reference.

- Type - Success
- Principal - Everyone
- Access - Special (Permissions: Write all properties, Modify permissions; Properties: all 'Write' type selected)
- Inherited from - Parent Object

Applies to - Descendant groupPolicyContainer objects

Two instances with the following summary information will be listed:

- Type - Success
- Principal - Everyone
- Access - blank (Permissions: none selected; Properties: one instance - Write gPLink, one instance - Write gPOptions)
- Inherited from - Parent Object

Applies to - Descendant Organization Unit Objects

Impact:

None - this is the default behavior.

See Also

https://workbench.cisecurity.org/benchmarks/18857