Skip to main content

AD FS

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

Active Directory Federation Services (AD FS) server role can be assigned:

  • to a domain controller
  • to a Windows server joined in the domain

Multiple AD FS federation servers can be included in a farm, a group of connected servers with configuration replicated between them. The first AD FS federation server you set up in the farm becomes the primary server. Other federation servers you add to the farm will become secondary servers.

Make sure you have Windows Remote Management properly configured on your Auditor console computer. See the Software Requirements topic for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary. See the Configure AD FS farm audit settings automatically topic for additional information.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • AD FS audit settings must be configured on the primary AD FS server, i.e. on the first server you have set up in the farm:

      • To configure audit of AD FS 4.0 on Windows Server 2016 or AD FS 5.0 on Windows Server 2019, use the following PowerShell cmdlets:

        Set-AdfsProperties -LogLevel Errors,FailureAudits,Verbose,SuccessAudits,Warnings
        Set-AdfsProperties –AuditLevel Verbose
      • To configure audit of AD FS 3.0 on Windows Server 2012 R2, use the following PowerShell cmdlet

        Set-AdfsProperties -LogLevel Errors,FailureAudits,Verbose,SuccessAudits,Warnings
    • Windows Audit policy must be configured on each server in the farm. For all Windows server versions Run the auditpol utility with the following parameters:

      • auditpol.exe /set /subcategory:"Application Generated" /failure:enable /success:enable
    • Adjust log size and retention settings for Security log and for AD FS Admin log (under Applications and Service logs). See Adjusting Event Log Size and Retention Settings for details.

    • If AD FS Admin logging is disabled, you should enable it.

    • See the Configure AD FS farm manually topic for additional information.

Configure AD FS farm audit settings automatically

Audit settings can be applied automatically if your monitoring plan has the primary AD FS federation server included as an item. If it has only secondary AD FS federation servers included, you will need to configure audit settings manually, as described later in this section.

Step 1 – Select the AD FS data source in this monitoring plan (top row under the header), click Edit data source to open its settings.

mp_adfs_listing_thumb_0_0

Step 2 – In the Configure audit settings section, select Adjust audit settings automatically check box.

mp_data_source_ad_fs_thumb_0_0

Step 3 – Save the settings.

Auditor will automatically configure audit settings on all servers in the AD FS farm and adjust the necessary log settings on these servers.

Configure AD FS farm manually

Follow the steps to enable AD FS audit settings and set up Windows audit policy.

Step 1 – AD FS audit settings must be configured on the primary AD FS server, i.e. on the first server you have set up in the farm:

  • To configure audit of AD FS 3.0 on Windows Server 2012 R2, use the following PowerShell cmdlet:

Set-AdfsProperties -LogLevel Errors,FailureAudits,Verbose,SuccessAudits,Warnings

  • To configure audit of AD FS 4.0 on Windows Server 2016 or AD FS 5.0 on Windows Server 2019, use the following PowerShell cmdlets:

Set-AdfsProperties -LogLevel Errors,FailureAudits,Verbose,SuccessAudits,Warnings

Set-AdfsProperties –AuditLevel Verbose

Step 2 – Windows Audit policy must be configured on each server in the farm. For all Windows server versions

  • Run the auditpol utility with the following parameters:

Step 3 – Adjust log size and retention settings for Security log and for AD FS Admin log (under Applications and Service logs). See the Adjusting Event Log Size and Retention Settings topic for additional information.

If AD FS Admin logging is disabled, you should enable it.

Remember, do the following:

AD FS Servers Data Collection

For Active Directory Federation Services (AD FS) servers, Netwrix Auditor can collect audit data on the events and configuration objects listed below.

Event typeActionDetails
AD FS logon (intranet)Failed LogonCause (for failed attempts)
AD FS logon (extranet)Successful LogonAuthentication methods (for Successful attempts)

Configuration information can be collected for the following objects:

  • AD FS servers included in the farm
  • Application Groups settings
  • Authentication Method names
  • Relying Party Trusts settings
  • Scope Descriptions

Permissions for AD FS Auditing

Before you start creating a monitoring plan to audit your AD FS federation servers, plan for the account that will be used for data collection – it should meet the requirements listed below. Then you will provide this account in the monitoring plan wizard.

On the target server:

  • If the target AD FS federation server is a domain controller, then the account must belong to the Administrators or Domain Admins group
  • Otherwise, if the server is not a domain controller, the account must belong to the Local Administrators group.