Hello
Thank you for your question and reaching out.
Please check below steps and make sure you have checked all relevant event log entries to be enabled for GPO.
--If the reply is helpful, please Upvote and Accept as answer--
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Hi Everyone,
We have followed the following guide from Microsoft in regards to enabling "advanced auditing" for Defender for Identity:
Any ideas?
I am certain have configured our GPO properly (but you never know):
Here are the results of running "auditpol /get /category:*" on one of the servers that this policy has been applied to:
As always, thanks for the help!
Hello
Thank you for your question and reaching out.
Please check below steps and make sure you have checked all relevant event log entries to be enabled for GPO.
--If the reply is helpful, please Upvote and Accept as answer--
Thanks for the link, however I have just confirmed that the relevant logs are on found on my DCs (that was applied via my GPO):
What I just did, was push the policies again from the "Default Domain Controllers Policy" GPO instead of the separate one I had created to see if that fixes the issue.
Edit: Pushing the polices to "Default Domain Controllers Policy" GPO, instead of a separate GPO, is what fixed it. I guess this is a super common bug with enabling Advanced Audit that has been resolved.