Standard auditing rules for Windows Server operating systems

Once a group policy with audit settings is active, the default auditing rules preconfigured with the operating system are turned off and only the explicitly configured audit settings are applied.

This is because the audit settings within the group policy are mapped as a CSV file. Thus, the audit.csv of the group policy at the lowest level overwrites that of all parent ones.

It is therefore recommended that the standard auditing rules be included in the group policy for the certification authority.

Tested operating system: Windows Server 2019. Results may differ for other operating systems.

Setting
Standard
Setting
Microsoft Baseline
System
Security System Extension No Auditing Success
System Integrity Success, FailureSuccess, Failure
IPsec DriverNo Auditing Not configured
Other System EventsSuccess, FailureSuccess, Failure
Security State ChangeSuccessSuccess
Logon/Logoff
LogonSuccess, FailureSuccess, Failure
LogoffSuccessNot configured
Account lockoutSuccessFailure
IPsec Main ModeNo Auditing Not configured
IPsec Quick ModeNo Auditing Not configured
IPsec Extended ModeNo Auditing Not configured
Special LogonSuccessSuccess
Other Logon/Logoff EventsNo Auditing Success, Failure
Network Policy ServerSuccess, Failure Not configured
User / Device ClaimsNo Auditing Not configured
Group MembershipNo Auditing Success
Object Access
File SystemNo Auditing Not configured
RegistryNo Auditing Not configured
Kernel ObjectNo Auditing Not configured
SAMNo Auditing Not configured
Certification ServicesNo Auditing Not configured
Application GeneratedNo Auditing Not configured
Handle manipulationNo Auditing Not configured
File ShareNo Auditing Success, Failure
Filtering Platform Packet DropNo Auditing Not configured
Filtering Platform ConnectionNo Auditing Not configured
Other Object Access EventsNo Auditing Success, Failure
Detailed File ShareNo Auditing Failure
Removable StorageNo Auditing Success, Failure
Central Policy StagingNo Auditing Not configured
Privilege Use
Non Sensitive Privilege UseNo Auditing Not configured
Other Privilege Use EventsNo Auditing Not configured
Sensitive Privilege UseNo Auditing Success, Failure
Detailed Tracking
Process CreationNo Auditing Success
Process TerminationNo Auditing Not configured
DPAPI ActivityNo Auditing Not configured
RPC EventsNo Auditing Not configured
Plug and Play EventsNo Auditing Success
Token Right Adjusted EventsNo Auditing Not configured
Policy Change
Audit Policy ChangeSuccess Success
Authentication Policy ChangeSuccess Success
Authorization Policy ChangeNo Auditing Not configured
MPSSVC Rule-Level Policy ChangeNo Auditing Success, Failure
Filtering Platform Policy ChangeNo Auditing Not configured
Other Policy Change EventsNo Auditing Failure
Account Management
Computer Account ManagementSuccessNot configured
Security Group ManagementSuccessSuccess
Distribution Group ManagementNo Auditing Not configured
Application Group ManagementNo Auditing Not configured
Other Account Management EventsNo Auditing Not configured
User Account ManagementSuccess Success, Failure
DS Access
Directory Service AccessSuccess Not configured
Directory Service ChangesNo AuditingNot configured
Directory Service ReplicationNo Auditing Not configured
Detailed Directory Service ReplicationNo Auditing Not configured
Account Logon
Kerberos Service Ticket OperationsSuccess Not defined
Other Account Logon EventsNo Auditing Not defined
Kerberos Authentication ServiceSuccess Not defined
Credential ValidationSuccess Success and Failure

Check audit settings at operating system level

The audit settings on operating system level can be queried with the following command. In the "Object Access" area, there is a "Certification Services" category.

auditpol.exe /get /category:* 

Related links:

en_USEnglish