Skip to main content

Active Directory Folder Templates

The Templates > Microsoft > Active Directory folder in the Navigation pane contains the following templates:

Authentication Folder

SubfolderTemplateDescriptionTAGS
AD: Failed Account AuthenticationsGathers Failed AD Authentications. Utilizes built-In “Failed Authentications” – Include Perpetrators Collection to define which accounts will be monitored for failed authentications. Add accounts to be monitored to this collection.None
AD: Successful Account AuthenticationsGathers Successful AD Authentications. Utilizes built-In “Successful Authentications” – Include Perpetrators Collection to define which accounts will be monitored for successful authentications. Add accounts to be monitored to this collection.None
AD: Successful Account LogonsNo customizations required. Most common modification: specify a list of users (AD Objects) to be included or excluded. Make sure the Exclude 'Noise' Events option on the Event Filtering Configuration Window is Off for this policy.Make sure the Exclude 'Noise' Events option on the Event Filtering Configuration Window is Off for this policy.None
Administrative AccountsAD: Domain Administrators Logons to Non Domain ControllersGathers logon events of Domain Administrator accounts to non-domain controller computes. Utilizes built-In “Domain Administrators” – Include Perpetrators Collection to define which accounts will be monitored for logons. Add accounts which have domain administrator rights to be monitored to this collection. Also utilizes built-In “Domain Controllers” – Hosts Collection to define which hosts will NOT be monitored for logons. Add domain controllers to be ignored to this collection.None
Administrative AccountsAD: Failed Administrator Account AuthenticationsGathers AD: Failed Administrator Account Authentications. Utilizes built-In “Administrative Accounts” – Include Perpetrators Collection to define which administrative accounts will be monitored for failed authentications.None
Administrative AccountsAD: Successful Administrator Account AuthenticationsGathers Successful AD Authentications for Administrators. Utilizes built-In “Administrative Accounts” – Include Perpetrators Collection to define which administrative accounts will be monitored for successful authentications. Add accounts with administrative rights to be monitored to this collection.None
Administrative AccountsAD: Successful Administrator Account LogonsUtilizes built-in “Administrator Accounts” – Objects Collection. Add accounts with administrator rights to be monitored to this collection Make sure the Exclude 'Noise' Events option on the Event Filtering Configuration Window is Off for this policyNone
Service AccountsAD: Failed Service Account AuthenticationsGathers Failed AD Authentications for service accounts. Utilizes built-In “Service Accounts” – Include Perpetrators Collection to define which service accounts will be monitored for failed authentications. Add service accounts to be monitored to this collectionNone
Service AccountsAD: Successful Service Account AuthenticationsGathers Successful AD Authentications for service accounts. Utilizes built-In “Service Accounts” – Include Perpetrators Collection to define which service accounts will be monitored for successful authentications. Add service accounts to be monitored to this collectionNone
Service AccountsAD: Successful Service Account LogonsUtilizes built-in "Service Accounts" – Objects Collection. Add service accounts to be monitored to this collection Make sure the Exclude 'Noise' Events option on the Event Filtering Configuration Window is Off for this policy.None

Groups Folder

SubfolderTemplateDescriptionTAGS
AD Group CreationsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD Group DeletionsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD: Group Membership ChangesNo customizations required. Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excludedNone
AD: Group Moves or RenamesNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD Group Type ModificationsNo customizations required. Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excluded
Administrative AccountsAD: Group Deletions by AdministratorsUtilizes built-in "Administrative Accounts" – Perpetrator Collection. Add accounts with administrative rights to be monitored to this collectionNone
Administrative AccountsAD: Group Deletions by Non-AdministratorsUtilizes built-in “Administrative Accounts” – Perpetrator Collection. Add accounts with administrative account to NOT be monitored to this collectionNone
Administrative AccountsAD: Group Membership Changes by AdministratorsUtilizes built-in "Administrative Accounts" – Perpetrator Collection. Add accounts with administrative rights to be monitored to this collectionNone
Administrative AccountsAD Group Membership Changes by Non-AdministratorsUtilizes built-in “Administrative Accounts” – Perpetrator Collection. Add accounts with administrative account to NOT be monitored to this collectionNone
Administrative AccountsAD: Group Moves or Renames by AdministratorsUtilizes built-in "Administrative Accounts" – Perpetrator Collection. Add accounts with administrative rights to be monitored to this collectionNone
Administrative AccountsAD: Group Moves or Renames by Non-AdministratorsUtilizes built-in “Administrative Accounts” – Perpetrator Collection. Add accounts with administrative account to NOT be monitored to this collection.None
Administrative GroupsAD: Deletions of Administrator GroupsUtilizes the built-in “Administrator Groups” – Objects Collection. Add administrator groups to be monitored to this collectionNone
Administrative GroupsAD: Group Membership Changes to Administrator GroupsUtilizes the built-in “Administrator Groups” – Objects Collection. Add administrator groups to be monitored to this collectionNone
Administrative GroupsAD: Moves or Renames of Administrator GroupsUtilizes the built-in “Administrator Groups” – Objects Collection. Add administrator groups to be monitored to this collectionNone

Lockdown Folder

CAUTION: Use cation with all Lockdown/Blocking Templates! Blank filters result in everything being locked down or blocked.

TemplateDescriptionTAGS
AD Generic LockdownSet the appropriate AD event type(s) to be blocked. Then select the desired AD Objects and Containers, AD Classes and Attributes, and AD Perpetrators to be allowed or deniedNone
Auth Generic LockdownSet the appropriate AD Perpetrator(s) and/or Host(s) to be blockedNone

Organizational Unit Folder

TemplateDescriptionTAGS
AD OU CreationsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD OU DeletionsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD OU ModificationsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD OU Moves or RenamesNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD OU Security ModificationsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone

Password Enforcement Folder

TemplateDescriptionTAGS
Password Enforcement MonitoringNo customizations required. Prevents users from changing a password to any value in the Threat Prevention dictionary of known compromised passwordsNone

Replication Folder

TemplateDescriptionTAGS
AD Replication LockdownUSE CAUTION WITH ALL LOCKDOWN TEMPLATES Prevents Active Directory data synchronization requests from non-domain controllers using RPC call IDL_DRSGetNCChanges. Add legitimate domain controllers to be inored in one of the following ways to prevent them from being blocked: - Allow Perpetrators List – Add the Users OU > Domain Controllers group and any other groups with domain controllers for a dynamic list of domain controllers - Exclude Domains/Servers – Add specific domain controllers for a static list of domain controllers See the AD Replication Lockdown Event Type topic for additional information.None
AD Replication MonitoringUtilizes the built-in “Domain Controllers” – Hosts Collection. Add domain controllers to not be monitored. Alternatively, add legitimate domain controllers to be ignored in one of the following ways: - Exclude Perpetrators List – Add the Users OU > Domain Controllers group and any other groups with domain controllers for a dynamic list of domain controllers - Exclude Domains/Servers – Add specific domain controllers for a static list of domain controllers See the AD Replication Monitoring Event Type topic for additional information.None

Server-Workstation Folder

TemplateDescriptionTAGS
AD: Computer Account CreationsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD: Computer Account DeletionsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD: Computer Account ModificationsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone

Users Folder

SubfolderTemplateDescriptionTAGS
AD: User Account CreationsNo customizations required. Most common modifications: specify AD Perpetrator to be included or excludedNone
AD: User Account DeletionsNo customizations required. Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excludedNone
AD: User Account LockoutsNo customizations required. Most common modifications: specify AD Objects to be included or excludedNone
AD: User Account ModificationsNo customizations required. Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excludedNone
AD: User Account Moves and RenamesNo customizations required. Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excludedNone
AD: User Account Password SetNo customizations required. Most common modifications: specify AD Objects and/or AD Perpetrator to be included or excludedNone
Administrative AccountsAD: Deletions of Administrator AccountsUtilizes built-in “Administrator Accounts” – Objects Collection. Add accounts with administrator rights to be monitored to this collectionNone
Administrative AccountsAD: Modifications of Administrator AccountsUtilizes built-in “Administrator Accounts” – Objects Collection. Add accounts with administrator rights to be monitored to this collectionNone
Administrative AccountsAD: Moves and Renames of Administrator AccountsUtilizes built-in “Administrator Accounts” – Objects Collection. Add accounts with administrator rights to be monitored to this collectionNone
Administrative AccountsAD: Password Set on Administrator AccountsUtilizes built-in “Administrator Accounts” – Objects Collection. Add accounts with administrator rights to be monitored to this collectionNone
Administrative AccountsAD: User Creations by AdministratorsUtilizes built-in "Administrative Accounts" – Perpetrator Collection. Add accounts with administrative rights to be monitored to this collectionNone
Administrative AccountsAD: User Creations NOT by AdministratorsUtilizes the built-in “Administrative Accounts” – Perpetrator Collection. Add accounts with administrative rights to NOT be monitored to this collectionNone
Administrative AccountsAD: User Deletions by AdministratorsUtilizes built-in "Administrative Accounts" – Perpetrator Collection. Add accounts with administrative rights to be monitored to this collectionNone
Administrative AccountsAD: User Deletions NOT by AdministratorsUtilizes the built-in “Administrative Accounts” – Perpetrator Collection. Add accounts with administrative rights to NOT be monitored to this collectionNone
Administrative AccountsAD: User Modifications by AdministratorsUtilizes built-in "Administrative Accounts" – Perpetrator Collection. Add accounts with administrative rights to be monitored to this collectionNone
Administrative AccountsAD: User Modifications NOT by AdministratorsUtilizes the built-in “Administrative Accounts” – Perpetrator Collection. Add accounts with administrative rights to NOT be monitored to this collectionNone
Administrative AccountsAD: User Moves and Renames by AdministratorsUtilizes built-in "Administrative Accounts" – Perpetrator Collection. Add accounts with administrative rights to be monitored to this collectionNone
Administrative AccountsAD: User Moves and Renames NOT by AdministratorsUtilizes the built-in “Administrative Accounts” – Perpetrator Collection. Add accounts with administrative rights to NOT be monitored to this collectionNone
Service AccountsAD: Deletions of Service AccountsUtilizes built-in "Service Accounts" – Objects Collection. Add service accounts to be monitored to this collectionNone
Service AccountsAD: Modifications of Service AccountsUtilizes built-in "Service Accounts" – Objects Collection. Add service accounts to be monitored to this collectionNone
Service AccountsAD: Moves and Renames of Service AccountsUtilizes built-in "Service Accounts" – Objects Collection. Add service accounts to be monitored to this collectionNone
Service AccountsAD: Password Set on Service AccountsUtilizes built-in "Service Accounts" – Objects Collection. Add service accounts to be monitored to this collectionNone