Overview
The AuditPolicies command enumerates both classic and advanced audit policy settings configured on the system. These policies determine what security events are logged by Windows, providing crucial insight into what activities will be visible to defenders through event logs. Understanding audit policies helps assess the visibility and logging posture of a target system, indicating what actions might be detected or remain unlogged.Syntax
This command does not support remote execution. Use AuditPolicyRegistry for remote enumeration.
Output
The command returns audit policy configuration including:- Classic audit policies (9 categories)
- Advanced audit policies (subcategories)
- Success/Failure audit settings
- Policy enforcement status
- Category-specific settings
Audit Categories
Classic Audit Policy Categories
Classic Audit Policy Categories
- System
- Logon/Logoff
- Object Access
- Privilege Use
- Detailed Tracking
- Policy Change
- Account Management
- Directory Service Access
- Account Logon
Use Cases
- Red Team
- Blue Team
- Identify which activities will generate event logs
- Discover logging blind spots for stealthy operations
- Plan actions to minimize forensic footprint
- Assess detection surface before executing techniques
- Understand which credential theft methods might be logged
- Determine if process creation is audited
Example Output
Remote Execution
For remote audit policy enumeration, use the AuditPolicyRegistry command instead, which reads audit settings from the registry and supports the-computername parameter.
Detection Considerations
This command has limited detection surface:
- API Calls: Uses
AuditQuerySystemPolicyandAuditEnumerateCategoriesAPIs - Privilege Level: Typically requires local administrator privileges
- Event Logs: May generate Security event 4719 (System audit policy changed) if policy is modified
- EDR Telemetry: Security products may log API calls to audit policy functions
Defensive Recommendations
- Monitor for execution of reconnaissance tools
- Alert on multiple enumeration commands from single process
- Track access to security policy APIs
- Correlate with other suspicious activities
- Enable process creation logging (Event ID 4688)
- Consider application whitelisting to prevent unauthorized tools
Related Commands
- AuditPolicyRegistry - Registry-based audit policy enumeration (supports remote execution)
- LocalGPOs - Local Group Policy settings
- Sysmon - Sysmon configuration and logging
- WindowsEventForwarding - WEF configuration
- SecurityPackages - Security package enumeration