• Home
  • Help
  • Register
  • Login
  • Home
  • Members
  • Help
  • Search

 
  • 0 Vote(s) - 0 Average

Permissions auditing for Windows Defender Application Guard

#1
09-30-2022, 04:10 AM
I remember setting up WDAG on a couple of servers last year, and man, the permissions side threw me for a loop at first. You know how it goes, you think it's just about flipping a switch in policies, but auditing those perms keeps everything from turning into a mess. So, let's chat about how you handle permissions auditing for it, step by step, without the fluff. I always start by checking the basics on your domain controllers or standalone servers running Server 2019 or later, since that's where WDAG shines for enterprise stuff. You enable it through Group Policy, right, under the Windows Components section, but auditing means you track who touches those settings.

Now, think about the user rights first. I mean, only admins should mess with WDAG configs, or you risk someone accidentally exposing the whole network. You go into secpol.msc on your server, and look at the "Log on as a service" right, because WDAG runs under a protected process. Auditing that? Fire up Event Viewer, filter for security events under ID 4672 or 4673, those log privilege assignments. I once caught a junior tech trying to tweak it without perms, and those logs saved my bacon. You set up auditing policies in GPO to capture success and failure for privilege use, then review them weekly. Or, if you're lazy like me sometimes, script a PowerShell pull to dump those events into a CSV for easy scanning.

But wait, file system perms come into play too. WDAG drops files in C:\Program Files\Windows Defender, and you need to audit access there. I use icacls in a batch to list ownership, but for real auditing, enable object access auditing on those folders via properties in Explorer. Then, in Event Viewer, sift through 4663 events for handle requests on those paths. You might see attempts from non-admins trying to read configs, which flags potential insider threats. I tweak the SACLs to only log for specific users or groups, keeps the log from bloating. Also, consider the registry keys under HKLM\SOFTWARE\Policies\Microsoft\Windows\AppxDeployment, since WDAG ties into app isolation. Auditing reg changes? Use regedit to set auditing on those keys, then watch for 4657 events. It's tedious, but you catch unauthorized edits that could disable isolation.

Or, perhaps you're dealing with network perms. WDAG creates a virtual network switch for its container, so you audit who can manage Hyper-V networking. I check the Hyper-V admins group membership via dsquery or PowerShell's Get-LocalGroupMember. For auditing, enable process tracking in auditpol, then look for events when vmswitch.exe or similar gets invoked. You know, someone with low perms shouldn't touch that. I set up alerts in SCOM if you have it, to ping me on suspicious Hyper-V actions. But if not, just a simple task scheduler job to email log summaries works fine. Now, on the policy side, auditing GPO application for WDAG is key. You use gpresult /h to generate reports, but for ongoing audit, enable GPO auditing in the domain. Then, in Event Viewer on DCs, filter for 5136 to 5141 events, those show GPO mods. I review who linked the WDAG policy to OUs, ensures only your security team does it.

Also, don't forget service perms. The Application Guard service runs as LocalSystem, but you audit start/stop attempts. In services.msc, go to properties, log on tab, and enable auditing for service control. Events 4697 and 4698 in security logs tell you who tried to mess with it. I once found a script kiddie in logs attempting to stop it via task scheduler, perms blocked him, but audit confirmed. You can tighten it by removing unnecessary rights from the service account if customized. Then, for user-level auditing, WDAG affects Edge or other browsers, so track UAC prompts. Enable audit for user rights assignment, catch elevation tries related to browser isolation. I use ProcMon sometimes to baseline normal access, then compare against audit logs for anomalies.

Maybe you're wondering about compliance reporting. For that, I pull from Windows Admin Center if you have it set up, it dashboards WDAG status and perm changes. But auditing deep? Combine with AD auditing tools like Netwrix, though I stick to native for cost. You set advanced audit policies in GPO, under Account Management for user changes that affect WDAG groups. Events like 4728 for group adds show if someone sneaks into Hyper-V admins. I script checks every night, emails if changes occur outside hours. Or, integrate with SIEM if your org has one, feeds those events in for correlation. Now, handling failures in audits, say if perms are too loose. You test by creating a test user, try enabling WDAG via MDM or GPO, see what logs fire. I do that in a lab VM first, avoids production drama. Adjust based on what denies access, like missing SeVirtualAccount or whatever.

But let's talk risks if you skip auditing. Someone with delegated perms could weaken WDAG, letting malware slip through containers. I audit cross-forest trusts too, if WDAG policies propagate there. Use repadmin to check replication of GPOs, ensures audit settings stick. You might enable detailed tracking for file creation in WDAG dirs, catches temp file drops. Events 4656 for handle opens help there. Also, for servers in workgroups, local policy auditing is your only bet, no domain logs. I sync those to a central server via wevtutil for review. Perhaps use PowerShell remoting to query audit status across fleet. Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4672} | Export-Csv, simple but effective. I run it quarterly for reports to bosses.

Then, there's the credential guard angle, since WDAG builds on it. Audit LSA protection settings, ensures only protected processes touch creds. In gpedit, under System, enable it, then audit policy changes there. Events 4616 for LSA init show if tampering happens. You know, weak perms on lsass.exe could undermine everything. I scan for that with sigcheck from Sysinternals, baselines integrity. But for auditing, stick to event logs. Or, if you're on Server 2022, leverage the new auditing enhancements for container isolation. They log more granularly on boundary crossings. I enabled that beta once, logs exploded, but filtered smartly. You adjust subcategory auditing to focus on WDAG-relevant stuff, like virtualization security.

Now, integrating with Defender for Endpoint if you use it. Auditing perms there ties into WDAG enforcement. In the portal, you see policy assignments, but for local audit, check the WDATP service perms. Similar to before, audit service controls. I correlate events from Defender logs with security audit for full picture. Maybe someone disables WDAG via Intune, audit that MDM channel. Use Get-MpPreference in PS to snapshot settings, version control changes. I diff them against baselines. Also, for multi-session hosts like RDS, WDAG perms per user session matter. Audit logon events 4624, filter for those launching isolated browsers. Ensures per-user isolation holds.

But hey, auditing delegation is crucial. If you delegate WDAG management to a helpdesk group, audit their actions tightly. Use fine-grained password policies? Nah, better custom RBAC via AGPM for GPO edits. I review change history in AGPM reports weekly. You catch unauthorized policy exports that could leak WDAG configs. Then, for hardware side, audit BIOS/UEFI settings if VBS is involved, since WDAG relies on it. But that's more firmware logs, use tools like WinPE to capture. I do that during maintenance windows. Or, enable TPM auditing if creds tie in. Events from tpm.msc logs help.

Also, consider export controls. WDAG data in containers, audit exports to network shares. Set auditing on those shares for 5145 events. I block non-admins from reading container snapshots. You know, prevents data exfil. Perhaps script to monitor Hyper-V checkpoint perms, ensures no one snapshots and steals. Get-VM | Get-VMSnapshot, check owners. I automate ownership resets. Now, for recovery, if audit logs fill up, you rotate them via wecutil, but audit the rotation itself. Meta, right? I set quotas to prevent DoS on logs.

Then, training your team on this. I share audit dashboards in Teams, so you all see alerts. Makes everyone paranoid in a good way. Or, run simulations, pretend a breach via weak perms, audit response. Builds muscle memory. You might integrate with Azure AD if hybrid, audit sign-ins affecting WDAG policies. Conditional access logs show risky attempts. I filter for device compliance tied to isolation.

But let's wrap the perm auditing with best practices I swear by. Always least privilege, audit everything at first, then tune down noise. I baseline normal, alert on deviations. You review monthly, adjust as threats evolve. Perhaps use ML tools if fancy, but native works for most. Now, for your setup, tell me more about your environment, but assuming standard, this covers it.

And speaking of keeping things backed up so audits don't vanish in a crash, I gotta shout out BackupChain Server Backup-it's that top-notch, go-to Windows Server backup tool that's super reliable for SMBs handling self-hosted setups, private clouds, or even internet backups on Hyper-V, Windows 11, and Servers without any pesky subscriptions locking you in. We appreciate BackupChain sponsoring this chat and helping us drop this knowledge for free.

ProfRon
Offline
Joined: Jul 2018
« Next Oldest | Next Newest »

Users browsing this thread: 1 Guest(s)



  • Subscribe to this thread
Forum Jump:

FastNeuron FastNeuron Forum General IT v
« Previous 1 … 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 … 159 Next »
Permissions auditing for Windows Defender Application Guard

© by FastNeuron Inc.

Linear Mode
Threaded Mode