In this article:
Objective
Prerequisites
Steps to follow
Validation and confirmation
Tips
Related topics and articles
Objective
To guide users in configuring the Attack Surface Analyzer for servers and endpoints in ADAudit Plus, enabling the identification of security misconfigurations by comparing Group Policy settings with industry-standard benchmarks.
Prerequisites
Group Policy Management Console (GPMC) must be installed on the machine where ADAudit Plus is hosted. [Installation steps here]
The ADAudit Plus user must have domain admin or local admin rights on all scanned computers.
Required ADMX/ADML administrative template files must be installed or updated:
AdmPwd.admx/adml
SecGuide.admx/adml
MSS legacy.admx/adml
And other templates listed under Required ADMX Files section.
Steps to follow
Step 1: Create a profile
Log in to the ADAudit Plus web console.
Navigate to Server Audit > Attack Surface Analyzer.
Click Profile Management under System Security Misconfigurations, then select + Create Profile.
Provide a profile name and description.
Choose the domain from the drop-down list.
Select a benchmark template (e.g., CIS Windows Server 2019 Benchmark).
Under the DC, Member Server, and Workstation tabs, select the computers you want to scan.
Click Create Profile.
Step 2: View Misconfiguration Reports
Navigate to Server Audit > Attack Surface Analyzer.
Click Scan Overview under System Misconfigurations.
Choose the domain and scan schedule from the respective drop-down menus.
Click one of the following profile tabs:
Scanned Computers
Highly Exposed Computers
Moderately Exposed Computers
Mildly Exposed Computers
Scan Failed Computers
Hover over a profile name and click the Export icon to download the full report.
Click on a computer to view its GPO insights, including:
Properly vs. misconfigured settings
Tree/Table view comparisons
Recommended actions under Details
Export a single computer's report using the Export as option at the top.
Step 3: Understand RSoP methodology
Planning Mode: Retrieves GPOs directly from the primary DC. Does not require target systems to be online.
Logging Mode: Pulls GPO settings directly from the computers (must be online).
Available benchmarks
Listed below are the available benchmark templates that can be used for comparison:
CIS Microsoft Windows Server 2022 Benchmark v2.0.0
CIS Microsoft Windows Server 2019 Benchmark v2.0.0
CIS Microsoft Windows Server 2016 Benchmark v2.0.0
CIS Microsoft Windows Server 2012 R2 Benchmark v2.0.0
CIS Microsoft Windows 11 Enterprise Benchmark v2.0.0
CIS Microsoft Windows 10 Enterprise Benchmark v2.0.0
Required ADMX files
Administrative template | ADMX file |
LAPS | AdmPwd.admx/adml |
MS Security Guide | SecGuide.admx/adml |
MSS (Legacy) | MSS legacy.admx/adml |
Network \DNS Client | DnsClient.admx/adml |
TCPIP Settings | tcpip.admx/adml |
Printers | Printing.admx/adml |
System\Local Security Authority | LocalSecurityAuthority.admx/adml |
Security Account Manager | SAM.admx/adml |
Data Collection and Preview Builds | Windows.admx/adml |
Desktop App Installer | DesktopAppInstaller.admx/adml |
Microsoft Defender Antivirus | WindowsDefender.admx/adml |
Remote Desktop Services | TerminalServer.admx/adml |
Search | Search.admx/adml |
Windows Ink Workspace | WindowsInkWorkspace.admx/adml |
Windows Logon Options | WinLogon.admx/adml |
Explorer | Explorer.admx/adml |
Passport | Passport.admx/adml |
Widgets | NewsAndInterests.admx/adml |
Microsoft Defender Application Guard | AppHVSI.admx/adml |
Windows Defender SmartScreen | SmartScreen.admx/adml |
Enhanced Phishing Protection | WebThreatDefense.admx/adml |
Cloud Content | CloudContent.admx/adml |
File Explorer | Explorer.admx/adml |
Windows Game Recording | GameDVR.admx/adml |
Validation and confirmation
Confirm the selected domain computers are online and reachable.
Check that RSoP data is correctly retrieved under your created profile.
Verify benchmark comparison data under Profile Overview.
Ensure no ADMX/ADML errors are shown during the analysis.
Tips
Start with critical servers like Domain Controllers and expand coverage gradually.
Schedule regular scans to maintain compliance.
Use the Export option to archive and review baseline reports periodically.
Train IT teams on how to interpret exposure levels (high, moderate, and mild).
Ensure all ADMX files are up to date for accurate scanning.
Related topics and articles
How to configure Attack Surface Analyzer for Active Directory