In this article:
Issue description
Possible causes
Prerequisites
Resolution
Related topics and articles
How to contact Support
Issue description
The File Integrity Monitoring reports in ADAudit Plus may display No Data Available, preventing the tracking and auditing of file and folder modifications. This issue may occur due to missing prerequisites, misconfigured audit policies, or insufficient permissions assigned to the service account, leading to failure in event log collection.
Prerequisites
Ensure the monitored system is added and configured in ADAudit Plus.
Confirm that the target drive is configured in ADAudit Plus.
Verify that the ADAudit Plus service account has the necessary privileges for log collection.
Confirm that the required audit policies are enabled to the changes.
Ensure the event log size is sufficient to retain logs before collection.
Possible causes
Drive not configured for auditing: The target drive isn't configured for auditing and is unable to capture file integrity events.
Insufficient privileges: The configured service account lacks the required permissions to read security logs and monitor file activities.
Log collection failure: The Remote Procedure Call (RPC) service is unavailable or blocked due to firewall restrictions, preventing log retrieval.
Event log retention issue: The security log size is incorrectly configured, causing older logs to be purged before ADAudit Plus can collect them.
Event ID 521 - Unable to log events to the security log: The security event log is either full, event logging is disabled, or system audit policies are misconfigured.
Misconfigured audit policies: The necessary audit policies are not enabled, preventing event logging.
Object-level auditing not set up: Auditing settings are not properly applied to the specific files or folders being monitored.
Resolution steps
Step 1: Drive not configured in File Integrity Auditing (Reference Document)
Ensure the target drive is added for monitoring in ADAudit Plus.
Navigate to the Server Audit tab.
Expand Configured Server(s).
From the left pane, navigate to File Integrity.
In FIM Configuration, click the edit icon.
Verify that the drive is configured in ADAudit Plus.
Step 2: Insufficient privileges (Reference Document)
Ensure that the service account configured in ADAudit Plus has the required privileges to collect and report File modification events. If the necessary permissions are not assigned, event logs may not be captured.
Step 3: Log collection failure (RPC Service Unavailable)
Ensure the required ports are enabled in the Firewall rules.
The required ports are listed below:
COM+ Network Access (DCOM-In)
Remote Event Log Management( RPC)
Remote Event Log Management( NP-IN)
Remote Event Log Management( RPC-EPMAP)
Step 4: Validate and test the event log retention settings (Reference Document)
Ensure the maximum log size is set to at least 4GB.
Open GPMC
To dit the <ADAuditPlusPolicy> GPO, go to Computer Configuration > Policies > Windows Settings > Security Settings > Event Log.
In the right pane, right-click Retention method for security log > Properties.
Set to Overwrite events as needed.
In the right pane, right-click Maximum security log size > Properties.
Define the size sufficient to hold 12 hours of data.
Step 5: Event ID 521: Unable to log events to security log
Since ADAudit Plus relies on Event Viewer, it only retrieves the events logged there. If Event ID 521 appears, it indicates that the system failed to log security events.
Step 6: Possible causes for 521 Event ID and fixes (Reference Document)
Security log full
Open Event Viewer.
Navigate to Windows Logs > Security.
Check if the log size has reached its limit.
Increase the maximum log size in GPMC as described in Step 4.
Event logging is disabled
Open Command Prompt as an Administrator.
Run: auditpol /get /category:*
Ensure that Audit Policy Change is enabled.
Windows event log service is not running
Open Run (Win + R), type services.msc, and press Enter.
Locate the Windows Event Log service, ensure it is running and set to Automatic.
Step 7: Ensure required audit policies are enabled
For the Event Viewer to capture events when changes occur, enable the necessary audit policies.
Steps to enable audit policies
Log in to a system with Group Policy Management Console (GPMC) using Domain Admin credentials.
Open GPMC and navigate to:
Default Domain Controllers Policy
ADAuditPlusMSPolicy
ADAuditPlusWSPolicy
In the Group Policy Management Editor:
Navigate to Computer Configuration > Policies > Windows Settings > Security Settings.
Navigate to Advanced Audit Policy Configuration, and configure the following settings:
Required audit policies (Reference Document)
Category | Subcategory | Audit events |
Object Access | Audit File System | Success, Failure |
Audit File Share | Success | |
Audit Handle Manipulation | Success, Failure | |
Policy Change | Audit Policy Change | Success, Failure |
Authorization Policy Change | Success |
Ensure required object-level auditing is enabled
Right-click the target folder.
Select Properties.
Go to the Security tab.
Click Advanced
Select the Auditing tab and enable the following settings.
Required object-level auditing (SACLS) (Reference Document)
Principal | Type | Access | Applies to |
Everyone | Success, Failure | Create files/Write data | This folder, subfolders, and files |
Create folders/Append data |
| ||
Write attributes |
| ||
Write extended attributes |
| ||
Delete subfolders and files |
| ||
Delete |
| ||
Everyone | Success, Failure | Take ownership | This folder and subfolders |
Change permissions |
|
Related topics and documentation
How to reach support
If the issue persists, contact our support team here.