☁️
CTHFM: Azure
  • Welcome
  • Getting Started
    • Account Setup
      • Account Creation Instructions
  • Azure Fundamentals
    • Azure Fundamentals Overview
      • Azure Documentation
      • Azure Entra
      • Azure Hierarchy
      • Identities
      • Azure Entra Roles
      • Azure RBAC
      • Azure Licensing Overview
        • Azure Entra ID Premium Licenses Comparison
      • Azure Shared Responsibility Model
      • Azure Frameworks
      • Azure Security Services
      • Conditional Access Policies
        • How Conditional Access Policies Work
        • Benefits of Conditional Access
        • Best Practices for Conditional Access
        • Conditions for Conditional Access
        • Conditional Access Controls
        • Sign-In Risk and Identity Protection
        • Conditional Access Session Control
        • Name Locations IP Location
      • Azure Quotas
      • Azure Tokens
        • Access Tokens
        • ID Tokens
        • Refresh Tokens
          • Invalidate Refresh Tokens
        • Primary Refresh Tokens
        • Continuous Access Evaluation (CAE)
        • Token Protection: Conditional Access (Public Preview)
  • Azure CLI
    • Introduction to Azure CLI
    • Installing Azure CLI
    • CLI Commands
    • Resource Group Management
    • Creating and Managing Resources with Azure CLI
    • Managing IAM
    • Azure CLI Automation
    • Monitoring and Troubleshooting in Azure CLI
    • Azure CLI Overview
      • Azure CLI: Linux
      • Azure CLI: Windows
      • Azure CLI: MacOS
  • KQL
    • KQL Overview
      • KQL Introduction
      • Data Types
      • Quick Reference
      • Render
      • Basic Queries
  • Powershell
    • PowerShell for Azure
      • Powershell Documentation
      • Powershell Basics
      • Understanding Powershell Variables
      • Understanding Cmdlets
      • Powershell Console & ISE
      • Powershell: Entra Module
        • Module Reference & Getting Started
      • Powershell: Azure Module
        • Installation Instructions
        • Powershell Azure CLI: Windows
        • Powershell Azure CLI: Linux
        • Powershell Azure CLI: MacOS
        • Example Azure Cmdlets
  • Bicep
    • Bicep File Structure
    • Variable Types
  • Azure Logging References
    • Logging
      • Log Retention Strategies
      • Azure Log Types
      • Azure Activity Logs
        • Administrative Event Schema
        • Service Health Notification Schema
        • Resource Health
        • Alert Category
        • Autoscale
        • Security
        • Recommendation
        • Policy
      • Entra ID Logging
        • Identity Based Logs
          • Audit Logs
          • Sign-In Logs
            • AADNonInteractiveUserSignInLogs
            • AADManagedIdentitySignInLogs
            • AADServicePrincipalSignInLogs
            • First Party Sign-In Activity
          • Provisioning Logs (AADProvisioningLogs)
          • Microsoft Graph Activity
          • Identity Protection
            • Risk Detections
            • AADRiskyServicePrincipals
            • AADRiskyUsers
            • AADUserRiskEvents
            • AADServicePrincipalRiskEvents
        • Additional Entra ID Logs
      • Azure Key Vault
        • Azure Key Vault Logging Overview
      • Network Watcher
        • RBAC Permissions
        • Flow Log Types
          • NSG Flow Log Schema
          • VNET Flow Log Schema
        • Enabling Logs
          • NSG Flow Logs
          • VNET Flow Logs
        • Packet Capture
          • Packet Capture: VM
          • Packet Capture: Scale Sets
      • Compute Resources
        • Azure Monitor Agent
        • VM Insights
          • VM Insights Tables
      • Storage Accounts
        • Storage Account Logging
          • File
            • Enable StorageFileLogs
            • StorageFileLogs
          • Blob
            • Enable Blob Logging
            • StorageBlobLogs
          • Queue
            • Enable Queue Logging
            • StorageQueueLogs Table
          • Table
            • Enable Table Logging
            • StorageTableLogs Table
      • Azure App Service
        • Log Types
        • Enabling Logging
      • Azure Monitor
        • Resource Logs
          • Resource Log Top Level Documentation
        • Log Analytics Workspace
          • Setup
        • Workbooks
        • Dashboards
        • Alerts
        • Azure Monitor Documentation
      • Defender for Cloud
      • Intune
      • Sysmon
      • Purview Audit Log Schema
      • Kubernetes Audit Log (AKS)
  • Threat Hunting
    • Threat Hunting in Azure
      • Threat Hunting Introduction
      • Threat Hunting Process
        • Hypothesis Generation
        • Investigation
        • Identification
        • Resolution & Follow Up
      • Pyramid of Pain
      • Azure Threat Hunting Ideas
      • Hands On Threat Hunting Examples
      • OSINT Feeds
  • Sigma
    • Sigma Rule Structure
  • Microsoft Defender TI
    • Microsoft Defender Threat Intelligence
      • Data Sets
      • Reputational Scoring
      • Analyst Insights
      • Microsoft Defender TI: Copilot Integration
  • MITRE Att&ck
    • MITRE Att&ck
      • MITRE Att&ck Concepts
      • MITRE Data Sources
      • MITRE Att&ck Mitigations
      • MITRE Att&ck: Azure
        • MITRE Att&CK: Azure Security Control Mapping
  • Microsoft Resources
    • Microsoft Incident Response Ninja Hub
    • Microsoft Defender XDR Ninja Hub
  • Azure Threat Research Matrix (ATRM)
  • Security Research & Resources
    • Azure Goat
    • Azure Security Research
      • Azure Related CVEs
  • Defender XDR
    • Defender XDR Overview
    • Defender XDR Licensing
    • Defender XDR Default Retention
    • Defender XDR Advanced Hunting Table Schemas
    • Automated Response Requirements
    • Supported Response Actions
  • Azure Sentinel
    • Sentinel Overview
    • Azure Sentinel Deployments
    • Supported Data
    • Workbook, Playbook, Notebook Comparison
    • Sentinel Workbooks
    • Entities
    • User and Entity Behavior Analytics
    • Anomaly Detection
    • Mult-Stage Attack Detection
    • Sentinel: Az CLI
  • Microsoft Defender
    • Microsoft Defender for Cloud References
    • Defender for Cloud: Az CLI
  • Azure Policy
    • Azure Policy
    • Azure Policy Components
    • Azure Policy Rules
    • Scope Azure Policy
    • Policy Assignments
    • Policy Effect
    • Initiative Definition
    • Policy Parameters
    • Remediation Task Structure
    • Use Cases for Azure Policy
    • Azure Policy: Az CLI
  • Intune
    • Intune Overview
    • Intune Licensing
    • Intune API Permission Scopes
    • Intune Sample Script Resources
  • Intune Logging
    • Configure Logging
    • Logging Schema References
    • Intune Queries and Resources
  • Windows Host Security
    • Windows System Architecture and OS Fundamentals
    • SysInternals
    • Basic vs Advanced Security Auditing
    • Sysmon
  • Adversary Emulation
    • AzureHound
    • AADInternals
      • Install
    • RoadTools
      • Install
    • Oh365UserFinder
    • GraphRunner
  • Incident Response
    • Incident Response
      • Azure IR Program Development Cheat Sheet
      • Azure IR Playbooks (MS Guidance)
      • Ransomware (MS Guidance)
  • Automation
    • Automation Overview
    • Logic Apps
      • How Logic Apps Work
      • Logic App Types
      • Triggers
      • Connectors
      • Conditional Logic and Control Flow
      • APIs in Logic Apps
      • Handling Large Workflows with Stateful Logic Apps
      • External Service Integration
      • Securing, Managing, and Scaling Azure Logic Apps
      • Logic Apps: Az CLI
  • Packet Analysis
    • Wireshark Cheatsheet
    • TShark Cheatsheet
    • TCPDUMP Cheatsheet
    • Protocol Analysis Basics
    • HTTP Response Code Cheatsheet
    • RFC Protocol Mappings
    • PCAP Acquisition
  • Detection Lab
    • Detection Lab Introduction
    • Account Creation Instructions
    • Enable MFA Within Azure Tenant
    • Create an Azure Admin With Cloud Shell
    • Setup and Install Instructions
  • VSCode and Code Setup
  • Deploying Code
  • Enabling Logs for Log Analytics Workspace
  • Logging Into Windows VM
  • Verifying Logs in Log Analytics Workspace
  • Creating Detections: Azure Monitor
  • Cost Management: Billing Alarms
Powered by GitBook
On this page
  • Overview
  • 1. Basic Security Auditing
  • 2. Advanced Security Auditing
  • Comparison Chart: Basic vs. Advanced Auditing
  • Which Auditing Should I Use?
  • Basic Auditing
  • Advanced Auditing
  1. Windows Host Security

Basic vs Advanced Security Auditing

Overview

Basic vs. Advanced Security Auditing in Windows refers to the granularity and control over which events are logged. Let’s break down both types, their differences, and which Windows versions they apply to based on the official Microsoft documentation and other relevant insights.

1. Basic Security Auditing

  • Scope: High-level or general security events such as successful/failed logins, account changes, policy changes, etc.

  • Categories: Basic auditing focuses on broad actions and event categories:

    • Account logon events (e.g., user login success/failure)

    • Logon/logoff events

    • Object access attempts (e.g., access to files, folders)

    • Policy change events

  • Use Case:

    • Useful when monitoring overall system security with less detailed logging.

    • Easier to configure and generate fewer logs, which is helpful in environments that need to conserve storage or avoid overwhelming security teams.

  • Configuration: Enabled through the Local Security Policy (GPO), under Security Settings > Local Policies > Audit Policy.

  • Windows Versions Supported: Available on Windows Server and client editions, such as Windows 10/11, Server 2012 R2, Server 2016, and later versions.

2. Advanced Security Auditing

  • Scope: Provides more detailed control over the types of events that are audited, allowing organizations to track specific activities.

  • Categories: Introduced additional audit settings beyond basic ones, with granular subcategories such as:

    • Process tracking: Detailed events on process creation and termination.

    • Logon events: Extra details such as interactive vs. remote logins.

    • Directory service access: Deep insights into changes and queries in Active Directory.

    • Detailed Object Access: Logs fine-grained access control attempts on files or objects, including access control list (ACL) information.

  • Use Case:

    • Recommended for high-security environments that require precise tracking, such as financial institutions or military setups.

    • Helps correlate specific activities (like a process injection attempt) with user actions or suspicious access patterns.

  • Configuration: Available via Advanced Audit Policy Configuration in Group Policy:

    • Found under: Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies.

    • Allows enabling or disabling individual subcategories of audit events to avoid excess noise in logs.

  • Windows Versions Supported: Advanced auditing applies to Windows Server (2012 R2 and later) and client OSes (Windows 7/8/10/11). It provides more control compared to the basic audit policy settings available on older systems like Windows XP or Server 2003.

Comparison Chart: Basic vs. Advanced Auditing

Feature

Basic Auditing

Advanced Security Auditing

Level of Granularity

General categories

Fine-tuned, per-event logging

Control

Limited to broad actions

Specific event subcategories

Noise (Log Volume)

Lower (fewer events)

Higher (more detailed logs)

Use Case

General monitoring

Detailed forensic tracking and threat hunting

Configuration Method

Local Policy > Audit Policy

GPO > Advanced Audit Policy Configuration

Supported Systems

Windows 7+, Server 2008+

Windows 7+, Server 2012 R2+

Which Auditing Should I Use?

  • Basic Auditing is useful when you need quick, lightweight monitoring.

  • Advanced Auditing gives organizations granular visibility over system activities, making it ideal for environments with specific compliance or security needs.

Both auditing types can be applied to Windows Server and client editions, and the right choice depends on the need for granularity. For security teams focused on detailed incident response, advanced auditing offers better flexibility and control.

Basic Auditing

Advanced Auditing

Last updated 7 months ago

Basic security audit policies - Windows 10MicrosoftLearn
Logo
Advanced security audit policies - Windows 10MicrosoftLearn
Logo