Group Policy Auditing Efficient tools recommendations

Daniel Klobnak 266 Reputation points
2023-04-21T15:55:35.78+00:00

At the risk of MS's wrath, I am looking for better options than looking Security Event logs for Event ID 5136 (which is catchall for lots of DS Changes) to try and determine who made/modified/etc GPOs. I have the auditing set up aka https://learn.microsoft.com/en-us/answers/questions/482551/gpo-audit-default What I like is I get a user. However, the balance is time-consuming (cross reference a GUID to determine the GPO) and would like detail to the change etc. So I am seeking any any recommended tools that are efficient for auditing/reviewing/presenting GPO modifications, adds, , details and who did the change, what was changed, and reflect Name vs GUID? Maybe some alerting? Something I can scan quickly (I have too many cooks in our AD Kitchen, and unfortunately I am not Head Chef to enforce Change Logs, etc.)

Windows for business | Windows Client for IT Pros | User experience | Other
0 comments No comments
{count} vote

1 answer

Sort by: Most helpful
  1. Limitless Technology 44,766 Reputation points
    2023-04-24T14:50:28.4966667+00:00

    Hi, I'd be happy to help you out with your question. Sorry for the inconvenience caused. When it comes to auditing Group Policy changes, it's important to have a tool that can efficiently track and report on who made the change, what was changed, and when it was changed. While the built-in auditing capabilities of Active Directory can help in this regard, reviewing Security Event logs for Event ID 5136 can be time-consuming and may not provide the level of detail you need. Firstly, you can enable auditing for Group Policy changes in Active Directory. Once auditing is enabled, you can use the built-in Windows Event Viewer to view and filter Security Event logs for relevant events, such as Event ID 5136, which indicates a change to a Group Policy object. By filtering these logs, you can quickly identify who made the change and when it was made. Additionally, you can use PowerShell scripts to generate detailed reports on Group Policy changes. Microsoft provides several pre-built scripts for this purpose, which you can find and download from the PowerShell Gallery Overall, while using Microsoft's built-in tools and resources may require more effort than using a third-party tool, it can still provide an effective and budget-friendly solution for auditing Group Policy changes in an Active Directory environment. Fortunately, there are several third-party tools available that can help you efficiently audit and monitor GPO modifications, adds, and changes. Some popular options include ManageEngine ADAudit Plus, Netwrix Auditor, Quest Change Auditor for Active Directory, and SolarWinds Access Rights Manager. These tools provide real-time auditing and reporting of Active Directory changes, including GPO changes, and can also generate alerts to notify you of any suspicious activity. In evaluating these tools, it's important to consider your specific needs and budget. However, by using one of these tools, you can save time and effort by quickly reviewing detailed reports and alerts on GPO modifications, adds, and changes, rather than manually reviewing Security Event logs. If you have any other questions or need assistance with anything, please don't hesitate to let me know. I'm here to help.

    If the reply was helpful, please don’t forget to upvote or accept as answer, thank you.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.