This module sets and enforces the advanced auditing policies for windows.
This module uses auditpol.exe
to configure the advanced auditing policies on Windows. In addition all policies that are managed this way are stored in the audit.csv
file so that the local group policy will not overwrite these settings every couple of hours.
This module requires:
- puppetlabs-stdlib (version requirement: >= 4.6.0 <5.0.0)
- Advanced auditing policies.
C:\Windows\system32\GroupPolicy\Machine\Microsoft\Windows NT\Audit
; the file in which windows group policy stores these policies.
To start using advanced_audit_policy, include the defined type in your profile. Then configure the policies you want to set.
Note: This module can also remove unmanaged audit policies within this file. When this is done, the default settings for this auditing policy will be set when te system reapplies its advanced security policies.
The advanced_audit_policy defined type accepts the following parameters:
Type: String
Default: $title
Values: Any valid advanced auditing subcategory.
Description: This String contains the auditing policy that will be managed with this module. Refer to the list of settings below.
Type: 'Enum'
Default: 'present'
Values: 'present'
or 'absent'
Description: Defines whether this subsetting should be absent or present in the advanced audit settings configuration csv.
Type: Enum
Default: 'disable'
Description: Enables or disables the audit settings on success.
Type: Enum
Default: 'disable'
Description: Enables or disables the audit settings on failure.
advanced_audit_policy {'Audit Logoff':
ensure => 'present',
success => 'disable',
failure => 'enable',
}
advanced_audit_policy {'Audit Logon':
ensure => 'absent',
}
advanced_audit_policy {'example':
policy => 'Audit File Share'
success => 'enable',
failure => 'enable',
}
This module can manages the following settings, future settings can be added to config.pp
:
- 'Audit Account Lockout'
- 'Audit Application Generated'
- 'Audit Application Group Management'
- 'Audit Audit Policy Change'
- 'Audit Authentication Policy Change'
- 'Audit Authorization Policy Change'
- 'Audit Certification Services'
- 'Audit Computer Account Management'
- 'Audit Credential Validation'
- 'Audit Detailed Directory Service Replication'
- 'Audit Detailed File Share'
- 'Audit Directory Service Access'
- 'Audit Directory Service Changes'
- 'Audit Directory Service Replication'
- 'Audit Distribution Group Management'
- 'Audit DPAPI Activity'
- 'Audit File Share'
- 'Audit File System'
- 'Audit Filtering Platform Connection'
- 'Audit Filtering Platform Packet Drop'
- 'Audit Filtering Platform Policy Change'
- 'Audit Handle Manipulation'
- 'Audit IPsec Driver'
- 'Audit IPsec Extended Mode'
- 'Audit IPsec Main Mode'
- 'Audit IPsec Quick Mode'
- 'Audit Kerberos Authentication Service'
- 'Audit Kerberos Service Ticket Operations'
- 'Audit Kernel Object'
- 'Audit Logoff'
- 'Audit Logon'
- 'Audit MPSSVC Rule-Level Policy Change'
- 'Audit Network Policy Server'
- 'Audit Non Sensitive Privilege Use'
- 'Audit Other Account Logon Events'
- 'Audit Other Account Management Events'
- 'Audit Other Logon/Logoff Events'
- 'Audit Other Object Access Events'
- 'Audit Other Policy Change Events'
- 'Audit Other Privilege Use Events'
- 'Audit Other System Events'
- 'Audit Process Creation'
- 'Audit Process Termination'
- 'Audit Registry'
- 'Audit RPC Events'
- 'Audit SAM'
- 'Audit Security Group Management'
- 'Audit Security State Change'
- 'Audit Security System Extension'
- 'Audit Sensitive Privilege Use'
- 'Audit Special Logon'
- 'Audit System Integrity'
- 'Audit User Account Management'
- 'Audit Central Access Policy Staging'
- 'Audit Removable Storage'
- 'Audit User / Device Claims'
- 'Audit Group Membership'
- 'Audit Token Right Adjusted'
- 'Audit PNP Activity'
- advanced_audit_policy
- auditpolicy
This is where you list OS compatibility, version compatibility, etc.
This module works on:
- Windows 2008 R2
- Windows 2012 R2
- Windows 2016
You can contribute by submitting issues, providing feedback and joining the discussions.
Go to: https://github.com/kpn-puppet/puppet-kpn-advanced_audit_policy
If you want to fix bugs, add new features etc:
- Fork it
- Create a feature branch ( git checkout -b my-new-feature )
- Apply your changes and update rspec tests
- Run rspec tests ( bundle exec rake spec )
- Commit your changes ( git commit -am 'Added some feature' )
- Push to the branch ( git push origin my-new-feature )
- Create new Pull Request