It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Setting Up Advanced Policy Logging

  • Last updated on

Before you install the XDR Collector, you must configure advanced policy logging to make sure the relevant event logs are sent to XDR.

You have two options to set up Advanced Policy Logging:

  • Run two scripts on your environment to set up Advanced Policy Logging. This is the recommended option.

  • Set up each server manually using the steps below. However, this option takes longer and is more error-prone. This method is useful if you can’t run a Powershell script for any reason.

Setting Up Advanced Policy Logging Using Scripts (Recommended)

These scripts set up your entire Windows environment at the same time.

Also, the following scripts limit the log storage capacity to 1 GB before being overwritten. Setting up servers manually doesn’t limit log storage capacity.

To run these scripts, you must be an Administrator of the server or domain.

  1. Download XDR Script to Enable Event Logging and XDR Mass Configuration.

  2. As Administrator of the server or domain, run these scripts on any Windows device that has access to your entire network.

Setting Up Advanced Policy Logging Manually

These settings ensure that relevant events are logged in the Security log. You don’t need to follow these steps if you use the above scripts to set up policy logging.

  • You must run each of these steps on each server in your environment.

  • Setting up servers manually doesn’t limit log storage capacity. Generating the relevant logs will impact the server’s cache and storage over time.

Follow these steps to complete the configuration:

  • Configure Advanced Audit Policy Settings

  • Enable PowerShell Module and Script Block Logging

  • Enable the PowerShell Operational Log

  • Apply and Update the Group Policy

Configuring advanced audit policy settings
  1. On each Windows server you want to collect data from, press the Windows button and the R key at the same time to start the Run tool.

  2. At the prompt, type gpedit.msc and click OK.

    RunTool.png
  3. In the Group Policy Management Editor, enable the following options:

Account Logon

Audit Credential Validation

Enable for both Success and Failure events.

Account Management

Audit User Account Management

Enable for both Success and Failure events.

Audit Security Group Management

Enable for both Success and Failure events.

Audit Computer Account Management

Enable for both Success and Failure events.

Detailed Tracking

Audit Process Creation

Enable for Success events.

Audit Process Termination

Enable for Success events.

Logon/Logoff

Audit Logon

Enable for both Success and Failure events.

Audit Logoff

Enable for Success events.

Audit Special Logon

Enable for Success events.

Object Access

Audit File System

Enable for both Success and Failure events.

Audit Registry

Enable for both Success and Failure events.

Audit Other Object Access Events

Enable for both Success and Failure events.

Policy Change

Audit Audit Policy Change:

Enable for both Success and Failure events.

Audit Authentication Policy Change

Enable for both Success and Failure events.

Privilege Use

Audit Sensitive Privilege Use

Enable for both Success and Failure events.

System

Audit System Events

Enable for both Success and Failure events.

Audit Security State Change

Enable for Success events.

Audit Security System Extension

Enable for both Success and Failure events.

Audit System Integrity

Enable for both Success and Failure events.

SecurityLogEvents.png

Enable PowerShell Module and Script Block Logging
  1.  In the Group Policy Management Editor, navigate to Computer Configuration > Policies > Administrative Templates > Windows Components > Windows PowerShell.

  2. Enable the following settings:

    • Turn on Module Logging: Enable this setting and specify the modules to log (e.g., Microsoft.PowerShell.* for all core modules).

    • Turn on PowerShell Script Block Logging: Enable this setting to log all script blocks processed by PowerShell.

      PowerShellModule.png
  • Close the Group Policy Management Editor.

Enable PowerShell Operational Log
  1. On a Windows system, press the Windows button and the R key at the same time to start the Run tool

  2. At the prompt, type eventvwr.msc and click OK.

    runtooleventviewer.png
  3. In the Event Viewer, navigate to Applications and Services Logs > Microsoft > Windows > PowerShell.

  4. Right-click Operational and select Properties.

  5. Ensure that Enable logging is enabled.
    If Enable logging is not enabled, select it.

  6. Click OK.

    PowerShellOperationalLog.png
Apply and Update Group Policy
  1. On a target Windows server, open the Start menu and type cmd.

  2. Click Command Prompt.

  3. At the prompt, type gpupdate /force and click OK.

  4. Repeat steps 1-2 for each server in the environment.