/
/

How to Audit GPO Changes

by Andrew Gono, IT Technical Writer
How to Audit GPO Changes blog banner image

Instant Summary

This NinjaOne blog post offers a comprehensive basic CMD commands list and deep dive into Windows commands with over 70 essential cmd commands for both beginners and advanced users. It explains practical command prompt commands for file management, directory navigation, network troubleshooting, disk operations, and automation with real examples to improve productivity. Whether you’re learning foundational cmd commands or mastering advanced Windows CLI tools, this guide helps you use the Command Prompt more effectively.

Key Points

  • Enable Native GPO Auditing: Configure built-in Windows auditing to capture GPO and OU modifications.
  • Track Critical Event IDs: Prioritize essential event IDs (5136, 5137, 5138, 5139, 5141) to efficiently identify impactful GPO, OU, and permission changes.
  • Centralize Logs with WEF: Use Windows Event Forwarding (WEF) and Windows Event Collector (WEC) to consolidate policy change logs.
  • Version Control and Backups: Regularly back up and version GPOs through the Group Policy Management Console (GPMC) to simplify rollback.
  • Alert on High-Risk Changes: Set alerts for high-priority events and define thresholds for anomalies (e.g., after-hours changes).

Group Policy Objects (GPOs) provide ways to effectively apply policies at scale, but this also means that small errors can have far-reaching consequences. Knowing how to audit GPO changes protects your infrastructure. And with the right tools, you can easily enforce version control and set alerts for continuous monitoring.

This article explains how to check GPO changes with built-in solutions, and highlights third-party Remote Monitoring and Management (RMM) tools that adapt to all your clients’ needs.

How to audit GPO changes for better traceability

While native tools can offer cost-effective solutions, consider expanding your toolkit for efficiency, and factor in your technical constraints before establishing audit workflows for clients.

📌 Prerequisites:

  • Administrative privileges
  • Domain and forest functional levels that support Advanced Audit Policy
  • GPMC access for policy review and backup
  • SIEM or Windows Event Collector infrastructure for log centralization
  • A designated file share or repo for versioned GPO backups
  • A change register template and owners for reviews and approvals

Step 1: Enable native auditing for policy changes

IT experts can track changes to GPOs and Organizational Units (OUs) using built-in Directory Service auditing on Domain Controllers. Here’s how:

📌 Use Cases: Use this to capture detailed logs of every GPO and OU change.

📌 Prerequisites: Windows server domain controllers, Education, or Pro; Local and domain administrative privileges.

💡 Note: These permissions correspond to audit categories that generate Event ID 5136 (Directory Service Object Modified) and similar events.

  1. On a domain controller, press Win + R, type gpmc.msc, and press Enter to open the Group Policy Management Console (GPMC).
  2. Create or edit a GPO linked to the Domain Controllers OU.
  3. Navigate to:Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > DS Access
  1. Enable the following policies:
    1. Audit Directory Service Changes → Success and/or Failure
    2. Audit Policy Change → Success and/or Failure
    3. Audit Account Management → Success and/or Failure
  2. Apply the GPO. The settings will replicate to all Domain Controllers.
  3. Use ADSIEDIT.msc to configure object-level auditing:
    1. Connect to the Default Naming Context.
    2. Locate your target container (e.g., OUs containing user policies).
    3. Right-click → Properties > Security tab > Advanced > Auditing tab.
    4. Add a Principal (e.g., Domain Admins, Authenticated Users).
    5. Select Success/Failure and check permissions such as:
      1. Create groupPolicyContainer objects
      2. Delete
      3. Modify Permissions
      4. Write versionNumber
  4. Click OK to save.

💡Note:.On Windows 11, adsiedit.msc is only available if RSAT (Active Directory Domain Services Tools) has been installed through Optional Features or via Add-WindowsCapability.

Integrating endpoint solutions like NinjaOne boosts policy protection beyond native tools with premium features like real-time alerts and device health checks to help you audit GPO changes.

Step 2: Know the events that matter

Some events are more important than others when you audit GPO changes. As such, you’ll need to prioritize impactful signals to reduce alert fatigue.

Use these key Event IDs to filter out critical events and form a matrix that simplifies your Group Policy audit:

  • GPO Changes:
    • 4739 – Domain Policy changed
    • 5136 – Directory Service object modified (includes GPO edits)
  • OU Changes:
    • 5137 – Directory Service object created (OU created)
    • 5141 – Directory Service object deleted (OU deleted)
    • 5139 – Directory Service object moved (OU moved)
  • Security Filter & Delegation:
    • 4670 – Permissions on an object changed
    • 4732/4733 – Security group membership changes (affecting GPO filtering and delegation)

Step 3: Centralize and protect the logs

Centralizing your logs across different Domain Controllers (DCs) with Windows Event Forwarding (WEF) can make evidence easier to query, improve visibility, and bolster compliance efforts as you audit GPO changes.

📌 Use Cases: To streamline log audits and support forensic investigations.

📌 Prerequisites: Administrative privileges, domain-joined systems, Windows Remote Management (WinRM) enabled.

  1. Press Win + R, type cmd, and press Ctrl + Shift + Enter.
  2. Run wecutil qc to set up the Windows Event Collector (WEC) service.
  3. Press Win + R, type eventvwr.msc, and press Enter.
  4. Expand Subscriptions.
  5. Right-click and choose Create Subscription.
  6. Name your subscription.
  7. Set Destination Log to Forwarded Events.
  8. Choose a subscription mode.
    1. In most domain environments, Source-Initiated is recommended unless you specifically need Collector-Initiated behavior.
  9. Select events to collect (use XML tab for advanced filters).
  10. On your Domain Controllers, run the following in the Command Prompt:

winrm qc

wecutil qc

  1. Press Win + R, type gpedit.msc, and press Ctrl + Shift + Enter.
  2. Navigate to:

Computer Configuration > Administrative Templates > Windows Components > Event Forwarding

  1. Double-click Configure target Subscription Manager.
  2. Set to Enabled, click Show, and add:

Server=http://<CollectorFQDN>:5985/wsman/SubscriptionManager/WEC,Refresh=60

Replace <CollectorFQDN> with your collector’s fully qualified domain name.

  1. Run gpupdate /force to apply the policy.
  2. Define Subscriptions.
    1. Baseline Subscription: Includes all devices for general monitoring.
    2. Suspect Subscription: Targets high-risk or anomalous devices for deeper logging.
  3. Use PowerShell or your SIEM’s parsing tools to standardize fields such as:
    1. Editor Account
    2. Target Object Distinguished Name (DN)
    3. Change Type
    4. Originating DC
  4. Retain logs for:
    1. Monthly reviews
    2. Quarterly reviews
    3. Incident investigations

Step 4: Back up, version, and diff GPOs

Prepare contingencies to enable safe rollbacks and technician-friendly version reviews as your teams audit GPO changes.

📌 Use Cases: Simplifying GPO change reviews for technicians for faster client reports.

  1. Press Win + R, type gpmc.msc, and hit Enter.
  2. Right-click Group Policy Objects and select Back Up All.
  3. Choose a secure location (e.g., access-controlled share).
  4. Form a GPO change register for auditability
    1. Track GPO name, version, editor, reason, and ticket ID.
  5. Compare current settings to previous versions using the Group Policy Management Console (GPMC) for quick analysis.

Step 5: Alert on high-risk changes

Timely action is required when you audit GPO changes. Follow these best practices to optimize your process:

PracticeValueExample scenario
Monitor Event ID 5136 for GPO modificationsNotifies technicians when GPO changes occur.A SOC analyst monitors Event Viewer for unauthorized changes to password policies.
Use PowerShell or SIEM tools to correlate GUIDs to GPO namesTranslates raw event data into readable GPO names for important reports.An MSP uses PowerShell to match GPO Globally Unique Identifiers (GUIDs) from logs to their friendly names in reports.
Set thresholds for unusual activity using an RMMChecks for anomalies like after-hours GPO modifications; can limit changes per GPO.A technician sets alerts for GPO edits occurring outside business hours using NinjaOne.
Automate ticket creation with event details and GPO backup referencesLinks actionable alerts to your client’s remediation workflows while you audit GPO changes.A helpdesk system auto-generates a ticket when a GPO is modified, including backup info.

Auditing GPOs also plays a key role in optimizing identity infrastructure. According to a recent Forbes survey, 94% of organizations agree on the importance of Active Directory modernization, which involves continuous monitoring of GPO changes.

Step 6: Extend auditing to OUs and delegation

Organizational Units (or OUs) determine the scope of your policy and how it’s inherited. As you audit GPO changes, integrate OU creation, transfer, and removal events in your Group Policy audit for more comprehensive reports.

Doing so can also improve transparency and help uncover permission sprawl. Establish a regular cadence for GPO and OU reviews to ensure least-privilege practices are being applied.

NinjaOne integration simplifies OU change auditing

NinjaOne’s best-in-class RMM provides streamlined solutions for tracking fleet health and detecting policy drift. Here’s how NinjaOne helps you audit GPO changes:

StepWithout NinjaOneWith NinjaOne
Enable native auditing for policy changes.Manual configuration via gpedit.msc and adsiedit.msc; involves setting up audit policies on individual DCs.NinjaOne enhances visibility across endpoints and AD controllers with real-time logging and alerts.
Know the events that matter when you audit GPO changes.Technicians have to manually filter key Event IDs from a SIEM or built-in tools.NinjaOne allows you to define your own conditions for critical event IDs that automatically trigger ticketing workflows.
Centralize and protect the logs.Requires WEF reconfiguration and manual retention of policy change logs.NinjaOne centralizes log accumulation via SIEM integration (webhooks and API).
Back up, version, and diff GPOs.Manual GPO backup workflows and spreadsheet edits can increase error and resolution times.NinjaOne automates endpoint and policy backup with version control, encryption, and deduplication.
Alert on high-risk changes.Requires time-consuming script tests for GPO link edit detection, off-hours changes, and more.NinjaOne’s ticketing system creates straightforward workflows (enhanced by its script library) based on your policy conditions.
Extend auditing to OUs and delegation.Manual audits via Active Directory Users and Computers (ADUC) or PowerShellNinjaOne logs delegation changes and OU modifications in its records and simplifies search with filterable views.

Simplify GPO checks with endpoint solutions

Monitoring GPO modifications ensures compliance, operational resilience, and traceability. To audit GPO changes, use native directory and event logging, establish alerts through your SIEM or monitoring tools, review GPO link and scope changes using Group Policy Management, include OU activity for additional context, and report key metrics regularly to demonstrate control.

Related topics:

FAQs

Auditing GPO changes ensures visibility into policy modifications, prevents configuration drift, supports compliance, and protects against unauthorized access or errors that can impact the entire domain.

Use gpedit.msc to activate Advanced Audit Policy Configuration for Directory Service and Policy Change auditing, then configure auditing in adsiedit.msc to log specific actions by defined user groups.

Focus on Directory Service Change events such as 5136 (object modified), 5137 (object created), 5139 (object moved), and 5141 (object deleted), as these directly reflect changes to GPO objects. Event 4739 may also be relevant when monitoring domain-level policy changes.

Implement Windows Event Forwarding (WEF) and Windows Event Collector (WEC) to gather logs from multiple Domain Controllers into a single repository for easier monitoring and analysis.

Use the Group Policy Management Console (GPMC) to back up GPOs regularly and compare them with previous backups to track changes over time. Storing these backups securely provides an audit trail and supports rollback when needed, though Windows does not include built-in version control for GPOs.

You might also like

Ready to simplify the hardest parts of IT?