: Function WP_Styles::add was called incorrectly. The style with the handle "hello-elementor-child-style" was enqueued with dependencies that are not registered: hello-elementor-theme-style. Please see Debugging in WordPress for more information. (This message was added in version 6.9.1.) in /home/csrkub/domains/cube-vps.com/public_html/wp-includes/functions.php on line 6131
Notice: Function WP_Scripts::add was called incorrectly. The script with the handle "gpress-custom-js" was enqueued with dependencies that are not registered: gpress-siema. Please see Debugging in WordPress for more information. (This message was added in version 6.9.1.) in /home/csrkub/domains/cube-vps.com/public_html/wp-includes/functions.php on line 6131
*Cube-Host– full cloud services!!
Infrastructure security is impossible without transparent control. One of the key features that enables such control in a Windows environment is Audit Policy. Activating Windows Audit Policy helps track login attempts, file access, permission changes, process launches, and other important events.
In a corporate environment, especially when complying with ISO/IEC 27001, PCI DSS, or SOC requirements, Windows security auditing is not just an additional feature, but a mandatory element. In this article, we will discuss how to configure and use Windows audit policy effectively, with examples, lists, and recommendations.
Audit Policy is a mechanism built into Windows that allows you to log key user and process actions in the system log (Event Log). These logs can be used to:
Examples of events that can be logged:
|
Script |
Benefits of auditing |
|
Data leak investigation |
Shows who accessed which file and when |
|
Control of administrators’ actions |
Records changes in permissions, script execution |
|
Compliance with audit requirements (SOC, ISO) |
Complete event log with time and user references |
|
Protection against internal threats |
Detects abnormal activity and unauthorized access |
Audit policy in Windows allows you to log important events, including logins, file access, permission changes, process launches, and more. You can configure it locally (on a single server or workstation) or via Group Policy (GPO) in a domain.
Suitable for:
Press Win + R, type: secpol.msc and press Enter.
Go to the section: Local Security Policy → Local Policies → Audit Policy
You will have access to 9 main categories:
|
Category |
What it records |
|
Audit of access to objects |
Access to files, folders, registry |
|
System login audit |
Attempts to log in to the workstation (RDP, interactive) |
|
Network entry audit |
Access via network resources (e.g., shared drive) |
|
Audit of account events |
Creating, deleting, and modifying users |
|
Audit of privilege usage |
Use of administrative measures |
|
System event audit |
Restart, shutdown, service errors |
|
Audit of policy changes |
Attempts to change security policies |
|
Process audit |
Starting/closing applications |
|
Audit of directory services |
Only in Active Directory domains |
Example of inclusion:
Open the “Logon Audit” policy, select the following checkboxes:
Repeat for other necessary policies.
Changes take effect:
Or after execution:
gpupdate /force
Suitable for:
On the domain controller, press Win + R, enter:
gpmc.msc
Create a new GPO (for example: Audit Policy Servers)
Go to: Computer Configuration → Policies → Windows Settings → Security Settings → Local Policies → Audit Policy
As in the local settings, enable:
Specify which events to log: Success, Failure, or both.
Apply the GPO to the desired container (OU) with servers or workstations.
On client machines, perform the following:
gpupdate /force
or wait for the GPO to update automatically.
Starting with Windows Server 2008 R2 and Windows 7, a more flexible system has been introduced:
Enable the desired subcategories. Some of the most useful ones:
|
Subcategory |
Description |
|
Logon |
Successful and unsuccessful entries |
|
Object Access |
Attempts to access protected objects |
|
Account Logon |
User authentication via the network |
|
Policy Change |
Attempts to change security policies |
|
Privilege Use |
Use of administrative rights |
|
Process Creation |
Launching new processes |
To prevent advanced policies from conflicting with standard policies, it is recommended to disable the standard section:
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings = Enabled
Check:
auditpol /get /category:*
Enable, for example, login audit:
auditpol /set /subcategory:"Logon" /success:enable /failure:enable
All events are recorded in the Windows Security Log:
Use the event ID:
|
ID |
Event |
|
4624 |
Successful login |
|
4625 |
Login error |
|
4663 |
Attempt to access object |
|
4719 |
Changing audit settings |
|
4688 |
Starting the process |
|
4670 |
Changing permissions (ACL) |
Filtering by these IDs will allow you to quickly find the events you need.
Enabling Windows Audit Policy is a fundamental step toward ensuring security in any corporate IT infrastructure. Properly configured auditing allows you to identify threats, track data access, and comply with information security standards. Whether you use a dedicated server or Windows VPS, enabling and controlling audit policies is a wise investment in the stability and security of your environment.