In this article:
Issue description
Prerequisites
Possible causes
Resolution
Related topics and articles
How to reach support
Issue description
In ADAudit Plus, the DNS Changes reports profile provides insights into DNS record changes, including addition, removal, and modifications of DNS Node and DNS Zones within the Active Directory environment. However, in some instances, users may not find any data under the DNS Changes Reports profile. This issue typically arises due to misconfigurations in audit settings, insufficient privileges, or event data processing failures in ADAudit Plus. This document provides a structured approach to diagnosing and resolving this issue.
Prerequisites
All domain controllers (DCs) must be added and configured in ADAudit Plus for auditing.
Event collection should be happening successfully from all the configured DCs.
Necessary audit policies (Advanced Audit Policy > DS Access > Directory Services Changes > Success), object-level auditing, and the security event log size must be configured.
The Event Log retention size must be set to at least 4GB.
Possible causes
All DCs might not be configured in ADAudit Plus.
No communication from the product server to the respective machine.
Required privileges are not provided for the service account.
Audit policy or object-level auditing might not be enabled.
The event log size is set too low.
Files are stuck in the Installation Directory/ADAudit Plus/event data/raw or processed folders.
Resolution
Step 1: Verify all DCs are configured in ADAudit Plus
Navigate to the Domain Settings tab in ADAudit Plus.
Confirm that all DCs are configured.
Note: Security logs do not replicate, so it's essential to configure all DCs in ADAudit Plus.
Step 2: Check for communication issues
If log collection fails, check for RPC-related errors.
If encountering RPC Server Unavailable (Error Code 6ba), follow the troubleshooting guide here.
Step 3: Verify service account permissions
To check the service account configured in ADAudit Plus:
Go to Domain Settings.
Click the drop-down next to the domain name.
Select Modify Credentials.
Grant necessary permissions
Open Active Directory Users and Computers.
Navigate to Built-in > Event Log Readers.
Right-click Event Log Readers > Members and add the configured service account.
Step 4: Configure audit policies
Log in to any computer that has the Group Policy Management Console (GPMC) with domain admin credentials.
Open GPMC and right-click Default Domain Controllers Policy > Edit.
In the Group Policy Management Editor, click Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policy and double-click the relevant policy setting.
In the right pane, right-click the relevant Subcategory > Properties > Select Success, Failure, or both as directed in this document.
Under DS Access category, enable the Success check box beside Directory Services Changes.
Step 5: Configuring object-level auditing
Log in to any computer that has the Active Directory Service Interfaces snap-in. Open the ADSI Edit console. Click OK and right-click ADSI Edit > Connect to.
In the Connection Settings window under Select or type a Distinguished Name or Naming Context, type the distinguished name as per your domain name and the partition where the zone is stored.
Type DC=adap,DC=internal,DC=com as the Distinguished Name. (This partition is generally loaded in Adsiedit by default.)
Type DC=DomainDNSZones,DC=adap,DC=internal,DC=com as the Distinguished Name.
Type DC=ForestDNSZones,DC=adap,DC=internal,DC=com as the Distinguished Name.
In the left panel, click Default naming context and right-click MicrosoftDNS > Properties > Security > Advanced > Auditing > Add.
In the Auditing Entry window, select a principal > Everyone > OK and type Success. Select the appropriate permissions as directed in the table below.
Auditing entry number | Auditing entries for | Access | Apply onto | |
Windows Server 2003 | Windows Server 2008 and above | |||
1 & 2 | DNS Zones |
| This object and all child objects | This object and all descendant objects |
| DNS Zone objects | Descendant DNS Zone objects | ||
3 & 4 | DNS Nodes |
| This object and all child objects | Descendant DNS Zone objects |
| DNS Node objects | Descendant DNS Node objects |
Note: Repeat steps for the remaining two default naming contexts.
Step 6: Configuring event log settings
The event log size needs to be defined to prevent audit data loss due to events being overwritten. To configure event log size and retention settings:
Log in to any computer that has the Group Policy Management Console (GPMC) with domain admin credentials. Open GPMC and right-click Default Domain Controllers Policy > Edit.
In the Group Policy Management Editor, click Computer Configuration > Policies > Windows Settings > Security Settings > Event Log.
In the right pane, right-click Retention method for security log > Properties > Overwrite events as needed.
In the right pane, right-click Maximum security log size > Define size (preferably 4GB).
Note: Ensure the security event log holds a minimum of 12 hours of data.
Step 7: Check for stuck files in the Event Data folder
If files are stuck in Installation Directory/ADAudit Plus/event data/raw or processed folders, contact ManageEngine support for assistance.
Related topics and articles
How to reach support