Share via


Active Directory: How to Detect Who Deleted a Group Policy Object

Why It Is Important

Group Policy Objects (GPOs) can provide configurations for access to shared resources and devices, enable critical functionalities or establish secure environments. If some of the GPOs are deleted, users may not be able to access the Internet, modify their data, use peripherals or even log in to their systems. Deleting GPOs that deal with access control, authentication and other security policies may increase systems’ vulnerability and allow unauthorized access.

Steps

Native Auditing

Run GPMC.msc → Create a new group policy and assign it to the needed OU → Edit it → Computer Configuration → Policies → Windows Settings → Security Settings:

  • Advanced Audit Policy Configuration → Audit Policies → Object Access → Audit File System > Define → Success and Failures
  • Advanced Audit Policy Configuration → Audit Policies → Object Access → Audit Handle Manipulation → Define → Success and Failures
  • Local Policies → Audit Policy → Audit directory service access → Define → Success and Failures
  • Event Log → Define → Maximum security log size to 4gb and Retention method for security log to Overwrite events as needed.

ADSI Edit

  1. Open ADSI Edit → Connect to Default naming context → DC=domain name → CN=System → right click "CN=Policies" → Properties → Security (Tab) → Advanced → Auditing (Tab) → Click "Add" → Choose the following settings:
    • Principal: Everyone; 
    • Type: Success; 
    • Applies to: This object and all descendant objects; 
    • Permissions: Delete groupPolicyContainer objects
  2. Navigate to the \domainname\sysvol\domainfqdn → right-click "Policies" folder and select "Properties".
  3. Select the "Security" tab → "Advanced" button → "Auditing" tab → Click "Add".
  4. Select Principal: "Everyone"; Select "Type: All"; Select "Applies to: This folder, subfolders and files"; Select the following "Advanced Permissions":
    • Write attributes; 
    • Write extended attributes; 
    • Delete; 
    • Delete subfolders and files; 

Security Events

To define what group policy was deleted filter Security Event Log for Event ID 4663 (Task Category – "File System" or "Removable Storage") and search for "Object Name:" string, where you can find the path and GUID of deleted policy and "account name" field contains information about who deleted it.

http://img.netwrix.com/howtos/group_policy_changes_native.png

Real Life Use Case Video

View

Credits

Originally posted - https://www.netwrix.com/how_to_detect_who_deleted_a_group_policy_object.html