I'll preface this with: I am a Linux admin. Windows to me is like me driving a UK car -- mostly operates the same but the steering wheel, buttons, and levers are in the wrong place and labels are spelled funny.
I have a server that is a domain member. There are GPO applied from the domain. Normal enough.
When I run auditpol on this server, I see policies that are set that are not set in secpol.msc and not set in the domain GPO. I also compared the list of applied GPO from running gpresult and found that there are only three GPO being applied. (This list of 3 GPO was the list I expected to see, so that was good).
Example:
Run on the member server:
PS C:\Windows\system32> .\auditpol.exe /get /category:\*
System audit policy
Category/Subcategory Setting
System
Security System Extension No Auditing
System Integrity Success and Failure
IPsec Driver No Auditing
Other System Events Success and Failure
Security State Change Success
Logon/Logoff
Logon Success and Failure
...(truncated)...
And
PS C:\Windows\system32> .\gpresult.exe /v /r /scope computer
...(truncated)...
RSOP data for CORP\fflintstone on MGMTWIN01A : Logging Mode
-----------------------------------------------------------
OS Configuration: Member Server
OS Version: 10.0.14393
Site Name: XYZ
Roaming Profile: N/A
Local Profile: C:\Users\fflintstone
Connected over a slow link?: No
COMPUTER SETTINGS
------------------
CN=MGMTWIN01A,OU=Windows,OU=Servers,DC=corp,DC=example,DC=com
Last time Group Policy was applied: 11/2/2018 at 2:13:01 PM
Group Policy was applied from: corpdc01a.corp.example.com
Group Policy slow link threshold: 500 kbps
Domain Name: CORP
Domain Type: Windows 2008 or later
...(truncated)...
Applied Group Policy Objects
-----------------------------
Default Domain Policy (CORP)
Windows Allow RDP Access
Windows Startup Script
The following GPOs were not applied because they were filtered out
-------------------------------------------------------------------
Local Group Policy
Filtering: Not Applied (Empty)
...(truncated)...
The three GPO listed by gpreseult as "applied" all do not contain any of the settings listed as "Success" or "Success and Failure" in my example auditpol snippet.
Where are they being set? How can I track this down?
A clean install of Windows 2016 includes a built-in audit policy with the following default settings:
In the absence of any advanced audit group policy (either local or domain) you can modify the built-in policy by using the
auditpol /set
command. As far as I can see,auditpol
is also the only way to view the built-in policy.When and if any advanced audit group policy is applied to the server, the built-in audit policy is discarded and all audit settings are turned off except those that have been explicitly enabled via group policy. [It isn't clear to me under what circumstances, if any, this process is reversible; I'm still investigating.] You can still temporarily modify the audit settings using
auditpol /set
and/or the local legacy audit policy, but any such changes will be discarded the next time group policy is processed.From the looks of it, your server is still using the default audit policy. So the policies you are seeing are those that are built into a clean Windows install.
Those settings could also be set in the local policy. Open
gpedit.msc
on an affected PC and look for the settings in there.There is this Microsoft article saying Local Policy overwriting auditpol
https://docs.microsoft.com/en-us/troubleshoot/windows-server/identity/auditpol-local-security-policy-results-differ