Month: September 2020

  • How to move Windows 10 Security Audit Policies to Endpoint Manager / Intune

    Where do you start with moving polcies to Intune, I don’t think there is a right or wrong answer. I decided to start with Audit Policies. For 2 reasons. I need to standardise the security event auditing on our devices and we need to update one region to help with SCCM UDA.

    How to do it?

    Lets look at what we have today. We have differences between the computer around the regions in what we audit. An example below.

    PolciyEuropeAmericasAsiaPacific
    Audit LogonSuccess and FailureSuccess and FailureSuccess and Failure Success and Failure
    Audit File ShareFailureSuccess and FailureSuccess Success
    Audit Sensitive Privilege UseSuccess and FailureSuccess and FailureSuccess and FailureSuccess and Failure
    Audit Other Policy Change EventsSuccess and FailureSuccess and Failure FailureSuccess and Failure

    We know SCCM likes us to audit Logon events to make sure you have good User Device Affinity. You also need to have a good history of the events, otherwise it can impact you UDA.

    Checking the Microsoft Windows 10 1909 baseline, it likes to include these (But they do cause some noise in the event logs with impacts the SCCM UDA. Rock and a hard place anyone?)

    Audit Credential ValidationSuccess and Failure
    Audit Security Group ManagementSuccess
    Audit User Account ManagementSuccess and Failure
    Audit PNP ActivitySuccess
    Audit Process CreationSuccess
    Audit Account LockoutFailure
    Audit Group MembershipSuccess
    Audit LogonSuccess and Failure
    Audit Other Logon/Logoff EventsSuccess and Failure
    Audit Special LogonSuccess
    Audit Detailed File ShareFailure
    Audit File ShareSuccess and Failure
    Audit Other Object Access EventsSuccess and Failure
    Audit Removable StorageSuccess and Failure
    Audit Audit Policy ChangeSuccess
    Audit Authentication Policy ChangeSuccess
    Audit MPSSVC Rule-Level Policy ChangeSuccess and Failure
    Audit Other Policy Change EventsFailure
    Audit Sensitive Privilege UseSuccess and Failure
    Audit Other System EventsSuccess and Failure
    Audit Security State ChangeSuccess
    Audit Security System ExtensionSuccess
    Audit System IntegritySuccess and Failure

    Now we know what we want to audit, lets get started in Endpoint Manager. audit policies aren’t available in administrative templates (Yet). So we need to use the CSP. We can see the policies exist in ./Vendor/MSFT/Policy/Config/Audit. The CSP cover most of the audit points you will want, but we will only add the relevant ones.

    https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-audit

    Goto Devices -> Configuration Profiles. Select Add new.

    Select “Windows 10 and Later” and Custom in the profile.

    Select Add. Enter in the Name for the Audit Value, I add the criteria into the description.

    In the OMA-URI add in ./Vendor/MSFT/Policy/Config/Audit/AccountLogon_AuditCredentialValidation

    In the Data Type, Select Integer and the Value (0 Disabled, 1 Success, 2 Failure, 3 Success and Failure)

    Then press Save. Repeat for the rest of the desire values.

    Using the table below should get you to the 1909 Baseline.

    ConfigurationSet ToCSPData TypeValue
    Audit Credential ValidationSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/AccountLogon_AuditCredentialValidationInteger3
    Audit Security Group ManagementSuccess./Vendor/MSFT/Policy/Config/Audit/AccountManagement_AuditSecurityGroupManagementInteger1
    Audit User Account ManagementSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/AccountManagement_AuditUserAccountManagementInteger3
    Audit PNP ActivitySuccess./Vendor/MSFT/Policy/Config/Audit/DetailedTracking_AuditPNPActivityInteger1
    Audit Process CreationSuccess./Vendor/MSFT/Policy/Config/Audit/DetailedTracking_AuditProcessCreationInteger1
    Audit Account LockoutFailure./Vendor/MSFT/Policy/Config/Audit/AccountLogonLogoff_AuditAccountLockoutInteger2
    Audit Group MembershipSuccess./Vendor/MSFT/Policy/Config/Audit/AccountLogonLogoff_AuditGroupMembershipInteger1
    Audit LogonSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/AccountLogonLogoff_AuditLogonInteger3
    Audit Other Logon/Logoff EventsSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/AccountLogonLogoff_AuditOtherLogonLogoffEventsInteger3
    Audit Special LogonSuccess./Vendor/MSFT/Policy/Config/Audit/AccountLogonLogoff_AuditSpecialLogonInteger1
    Audit Detailed File ShareFailure./Vendor/MSFT/Policy/Config/Audit/ObjectAccess_AuditDetailedFileShareInteger2
    Audit File ShareSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/ObjectAccess_AuditFileShareInteger3
    Audit Removable StorageSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/ObjectAccess_AuditRemovableStorageInteger3
    Audit Audit Policy ChangeNot configured./Vendor/MSFT/Policy/Config/Audit/PolicyChange_AuditPolicyChangeInteger0
    Audit Authentication Policy ChangeNot configured./Vendor/MSFT/Policy/Config/Audit/PolicyChange_AuditAuthenticationPolicyChangeInteger0
    Audit MPSSVC Rule-Level Policy ChangeSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/PolicyChange_AuditMPSSVCRuleLevelPolicyChangeInteger3
    Audit Other Policy Change EventsNot configured./Vendor/MSFT/Policy/Config/Audit/PolicyChange_AuditOtherPolicyChangeEventsInteger0
    Audit Sensitive Privilege UseSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/PrivilegeUse_AuditSensitivePrivilegeUseInteger3
    Audit Other System EventsSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/System_AuditOtherSystemEventsInteger3
    Audit Security State ChangeSuccess./Vendor/MSFT/Policy/Config/Audit/System_AuditSecurityStateChangeInteger1
    Audit Security System ExtensionSuccess./Vendor/MSFT/Policy/Config/Audit/System_AuditSecuritySystemExtensionInteger1
    Audit System IntegritySuccess and Failure./Vendor/MSFT/Policy/Config/Audit/System_AuditSystemIntegrityInteger3
    Audit Non Sensitive Privilege UseNot configured./Vendor/MSFT/Policy/Config/Audit/PrivilegeUse_AuditNonSensitivePrivilegeUseInteger0
    Audit Other Privilege Use EventsNot configured./Vendor/MSFT/Policy/Config/Audit/PrivilegeUse_AuditOtherPrivilegeUseEventsInteger0
    Audit Authorization Policy ChangeNot configured./Vendor/MSFT/Policy/Config/Audit/PolicyChange_AuditAuthorizationPolicyChangeInteger0
    Audit Application Group ManagementSuccess and Failure./Vendor/MSFT/Policy/Config/Audit/AccountManagement_AuditApplicationGroupManagementInteger3
    Audit IPsec DriverNot configured./Vendor/MSFT/Policy/Config/Audit/System_AuditIPsecDriverInteger0
    Audit Other Object Access EventsNot configured./Vendor/MSFT/Policy/Config/Audit/ObjectAccess_AuditOtherObjectAccessEvents

    Press Save, and then assign it to your test Azure AD Group and press save.

    Give it some time to apply. If you’re impatient like me, force a Sync through Settings > Accounts > Access work or school. Click your work or school account, then click Sync.

    How do we know its worked? You can run the following command to see what’s change.

    C:\>auditpol /get /category:*
    System audit policy
    Category/Subcategory Setting
    System
    Security System Extension Success
    System Integrity Success and Failure
    IPsec Driver Success and Failure
    Other System Events Success and Failure
    Security State Change Success
    Logon/Logoff
    Logon Success and Failure
    Logoff Success and Failure
    Account Lockout Failure
    IPsec Main Mode No Auditing
    IPsec Quick Mode No Auditing
    IPsec Extended Mode No Auditing
    Special Logon Success
    Other Logon/Logoff Events No Auditing
    Network Policy Server No Auditing
    User / Device Claims No Auditing
    Group Membership Success
    Object Access
    File System No Auditing
    Registry No Auditing
    Kernel Object No Auditing
    SAM No Auditing
    Certification Services No Auditing
    Application Generated No Auditing
    Handle Manipulation No Auditing
    File Share Success and Failure
    Filtering Platform Packet Drop No Auditing
    Filtering Platform Connection No Auditing
    Other Object Access Events Success and Failure
    Detailed File Share Failure
    Removable Storage Success and Failure
    Central Policy Staging No Auditing
    Privilege Use
    Non Sensitive Privilege Use No Auditing
    Other Privilege Use Events No Auditing
    Sensitive Privilege Use Success and Failure
    Detailed Tracking
    Process Creation Success
    Process Termination No Auditing
    DPAPI Activity No Auditing
    RPC Events No Auditing
    Plug and Play Events Success
    Token Right Adjusted Events No Auditing
    Policy Change
    Audit Policy Change Success
    Authentication Policy Change Success
    Authorization Policy Change Success
    MPSSVC Rule-Level Policy Change Success and Failure
    Filtering Platform Policy Change No Auditing
    Other Policy Change Events Failure
    Account Management
    Computer Account Management No Auditing
    Security Group Management Success
    Distribution Group Management No Auditing
    Application Group Management Success and Failure
    Other Account Management Events No Auditing
    User Account Management Success and Failure
    DS Access
    Directory Service Access No Auditing
    Directory Service Changes No Auditing
    Directory Service Replication No Auditing
    Detailed Directory Service Replication No Auditing
    Account Logon
    Kerberos Service Ticket Operations Success and Failure
    Other Account Logon Events Success and Failure
    Kerberos Authentication Service Success and Failure
    Credential Validation Success and Failure

    If it hasn’t worked, check the event long. Look in the event log. Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostic-Provider. Look for any errors. Most of my errors were either missing a character or adding a space to the end of the OMA-URI.