After applying a Windows Security Baseline to the Domain Controllers, or after enabling the Attack Surface Reduction Rule, "Block credential stealing from the Windows local security authority subsystem", GUID: 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2, Change Auditor no longer audits AD events and in agents 7.0.4 and later, the agent will fail to start. This will also impact agents installed on member servers resulting in the agent failing to start.
An error similar to the following is logged in the ChangeAuditor.AgentLog.nptlog:
[WARN][CServerControlHandler::TriggerHooking(154)] LDAP control hooking failed: 0x00000022
Or
[WARN][TrogdorLib::Common::CTrogdorService::StartImpl(187)] Error initializing sub-system SonicWALL Auditor (71).
[ERROR][itad2hook::DuplexHolderImpl::InitializeIPC(230)] Error starting pipe client. Unable to open pipe
Either disable the Attack Surface Reduction Rule, or add an exception for the Change Auditor agent, on any machine (regardless if it is a DC or member server) that has the CA agent installed.
To add an exception:
To disable the rule completely:
NOTE: There are multiple ways to configure ASR rules. The steps below are for configuring using the local group policy. Please see the following article for all the possible ways to configure ASR rules - https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction?view=o365-worldwide#group-policy
NOTE: In 7.0.4 and above the agent is stopped versus not recording AD events if the AD module cannot load.
You can check Windows Defender and disable it as well.
NOTE: If you are unable to find the paths referenced above, or are having any other issues with the configuration of ASR rules, please contact Microsoft.
© ALL RIGHTS RESERVED. Términos de uso Privacidad Cookie Preference Center