When deploying Microsoft Defender for Identity sensors on domain controllers, you may encounter the health alert: "Directory Services Advanced Auditing is not enabled as required." This error indicates that your domain controllers aren't configured to generate the specific Windows event logs that Defender for Identity relies on for threat detection - this event is notifying you to a configuration problem.
What Defender for Identity Actually Requires
Based on Microsoft's official documentation, Defender for Identity requires specific Advanced Audit Policy configurations to capture critical security events. The sensor validates these configurations once daily and reports health issues when requirements aren't met.
Required Advanced Audit Policy Settings
The following audit policies must be configured exactly as shown:
Account Management:
- Audit Computer Account Management: Success, Failure
- Audit Distribution Group Management: Success, Failure
- Audit Security Group Management: Success, Failure
- Audit User Account Management: Success, Failure
DS Access:
- Audit Detailed Directory Service Replication: Failure
- Audit Directory Service Replication: Failure
- Audit Directory Service Access: Success, Failure
- Audit Directory Service Changes: Success, Failure
Object Access:
- Audit File System: Success, Failure
Account Login
- Audit Credential Validation: Success, Failure
System:
- Audit Security System Extension: Success, Failure
These policies should be configured through Group Policy under: Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Audit Policies
You also need to configure the following setting as well, found under Security Options which include:
Network security: Restrict NTLM: Audit Incoming NTLM Traffic set to Enable auditing for all accounts
Network security: Restrict NTLM: Audit NTLM authentication in this domain set to Enable all
Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers set to Audit all
You can verify these settings are applied using:
auditpol /get /subcategory:"Directory Service Access"
auditpol /get /subcategory:"Directory Service Changes"
auditpol /get /subcategory:"User Account Management"
auditpol /get /subcategory:"Security Group Management"
auditpol /get /subcategory:"Distribution Group Management"
auditpol /get /subcategory:"Computer Account Management"
auditpol /get /subcategory:"File System"
auditpol /get /subcategory:"Security System Extension"
Each should return the appropriate Success/Failure settings as listed above.
The Missing Piece: Active Directory Object Auditing
The most common cause of this error isn't the Advanced Audit Policy settings themselves - it's the lack of object-level auditing configuration on Active Directory objects.
Even with perfect audit policies, you won't see events like:
- Event ID 5137 (Directory service object created)
- Event ID 5138 (Directory service object undeleted)
- Event ID 5139 (Directory service object moved)
These events require System Access Control Lists (SACLs) to be configured on Active Directory objects.
Configuring Active Directory Object Auditing
To generate the missing events, you need to configure auditing on the domain root:
- Open Active Directory Users and Computers
- Enable Advanced Features (View → Advanced Features)
- Right-click on the domain root (e.g., contoso.com)
- Properties → Security → Advanced → Auditing
- Add auditing entries for privileged groups
Recommended Security Groups for Auditing
Configure auditing for these specific privileged groups:
- Enterprise Admins
- Domain Admins
- Account Operators
Configure these groups with Full Control auditing for both Success and Failure events, with inheritance enabled for This object and all descendant objects.
Confirm in the Defender Identity
If you wish to confirm this you can navigate to this URL https://security.microsoft.com/securitysettings/identities then choose General>Sensor and you should see all the sensors healthy as below:
Conclusion
The "Directory Services Advanced Auditing is not enabled" from the Defender Sensor occurs when either the Advanced Audit Policies aren't configured correctly, or more commonly, when Active Directory object auditing isn't enabled on the domain root.
Both components are required:
- Advanced Audit Policies enable the audit categories
- I have found that some documentation does not cover the Account Login the correct version is here
- Active Directory object SACLs generate the actual events
Once properly configured, wait up to 10 minutes for the Defender for Identity sensor to detect the changes and clear the health alert.
ps : If you are really impatient, restart the Defender sensor update service that will restart both services for instant karma the sensor health department