Quick Fix Summary
Turn on Advanced Audit Policy Configuration through gpedit.msc for detailed tracking. On older systems, fall back to Local Policies → Audit Policy. Always test in a non-production environment first.
What’s Happening
As of 2026, Windows Server 2025 and Windows 11 24H2 ship with tighter auditing controls under Advanced Audit Policy Configuration, which replaces the old Basic Audit Policy settings. Relying only on failure events misses permission creep and sneaky access—success audits matter just as much.
How do I set it up?
Start on a domain controller or a Windows 11/2025 endpoint with RSAT installed.
- Hit Win + R, type gpedit.msc, and press Enter to open the Local Group Policy Editor.
- Drill down to: Computer Configuration → Windows Settings → Security Settings → Advanced Audit Policy Configuration → System Audit Policies → Account Logon.
- Open Audit Credential Validation. Check both Success and Failure. Click OK.
- Head to: Computer Configuration → Windows Settings → Security Settings → Advanced Audit Policy Configuration → DS Access.
- Double-click Audit Directory Service Access. Turn on Success and Failure. Click OK.
- Launch Command Prompt as Administrator and run:
gpupdate /forceto push the changes right away. - Confirm it’s working in Event Viewer: Event Viewer → Windows Logs → Security. Watch for Event ID 4662 (Directory Service Access) and 4776 (Credential Validation).
I followed the steps and nothing’s showing up
- Legacy Mode Fallback: On systems without Advanced Audit Policy, use: Computer Configuration → Windows Settings → Security Settings → Local Policies → Audit Policy. Turn on Audit directory service access and Audit object access here, but expect fewer details.
- Permissions Check: Make sure your account has Read access to the Security tab and the Manage auditing and security log user right (set via secpol.msc → Local Policies → User Rights Assignment).
- Centralized Auditing: For full domain coverage, set the policy in Group Policy Management Console (gpmc.msc). Link it to the Default Domain Controllers GPO or a custom GPO. Drill down to: Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → DS Access.
Do I need to enable anything else?
What events should I watch for?
How do I know if it’s working?
What about older Windows versions?
Can I set this up across my whole domain?
Is there a way to reduce log noise?
Audit policies create extra overhead, so stay lean:
| Action | Recommendation |
|---|---|
| Filter Events | In Event Viewer, build a Custom View that only shows key Event IDs (for example, 4662 or 4771 for failed logons). |
| Set Log Size | Adjust log retention in Event Viewer → Properties → Log Size. Aim for 1GB on domain controllers; older logs auto-archive. |
| Schedule Reviews | Run a weekly PowerShell script to export Security logs to a SIEM or archive:
Get-WinEvent -LogName Security -MaxEvents 1000 | Export-Csv -Path C:\audit\weekly_logs.csv |
| Test Before Deploying | Flip the switch on a test OU or file server first. Use dsacls to mimic access:
dsacls "CN=TestUser,OU=TestOU,DC=domain,DC=com" /view |
Heads-up: Basic Audit Policy (pre-Windows 10/Server 2016) is too coarse. Move to Advanced Audit Policy for real visibility Microsoft Docs.
What’s the bare minimum to get started?
Any common mistakes to avoid?
(Honestly, half the time admins miss the gpupdate /force step and wonder why nothing logs.)
