How to Configure Audit Policy for Registry Object Access in Windows using Intune

Today, I would like to explore how to configure the Audit Policy for Registry Object Access in Windows using Intune. Utilizing Intune to audit access attempts to specific registry objects on devices can significantly improve security monitoring. Object Access auditing encompasses 14 subcategories, allowing for detailed tracking of these access attempts.

Audit Policy for Registry Object Access setting allows tracking who tries to access registry objects. An audit event is only generated when a system access control list (SACL) is defined for the object, and the requested access type (like Read, Write, or Modify) and the requesting account match the SACL’s settings.

When Audit Audit Policy for Registry Object Access policy is configured, every time an account tries to access a registry object that has a specific SACL, an audit event is created. Successful attempts are recorded as “success audits”, and failed attempts are recorded as “failure audits”.

If this policy is not configured, the user would not know when someone tries to get into specific registry settings. Audit policies significantly enhance the device’s security. By configuring these settings, can record attempts to verify account information on a domain controller or the local Security Accounts Manager (SAM).

Patch My PC

What are the Advantages of Configuring Audit Policy for Registry Object Access in Windows using Intune?

How to Configure Audit Registry for Object Access Policy in Intune

Intune’s Object Access Audit Registry policy boosts security by tracking who accesses your system’s registry. This helps to spot unauthorized changes, catch insider threats, and ensure your system stays healthy.

It also helps meet compliance rules by creating a detailed log of registry activity, and the audit data is useful for investigating any security incidents.

Audit Policy for Registry Object Access in Windows using Intune

We can find the Audit Policy for Registry Object Access in the Auditing section of the Windows Configuration Service Provider (CSP), under the Object Access subcategories. The details of the Object Access_Audit Registry Policy within the Windows CSP will be shown next.

Description framework properties

Property NameProperty Value
Formatint
Access TypeAdd, Delete, Get, Replace
Default Value0
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Table 1

Allowed Values

In Intune’s Settings Catalog, the Allowed Values are the choices available for a particular setting. These selections directly dictate how that setting will behave on a device. The following table showcases the Allowed Values of the Object Access_Audit Registry policy.

ValueDescriptionFeatures
0 (Default)Off/None.No audit events are generated.
1SuccessAttempts that worked.
2FailureAttempts that didn’t work.
3Success + FailureBoth successful and failed attempts are recorded.
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Table 2

Group Policy Mapping

Group Policy Mapping or Group Policy Analytics in Microsoft Intune is a tool that helps to move the current Group Policy Objects (GPOs) to the cloud. The table below shows how the Audit Policy for Registry Object Access in Windows using Intune

NameValue
NameAudit Registry
PathWindows Settings > Security Settings > Advanced Audit Policy Configuration > System Audit Policies > Object Access
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Table 3

./Device/Vendor/MSFT/Policy/Config/Audit/ObjectAccess_AuditRegistry

How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.1 Credits MS
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.1 Credits MS

OMA-URI Setting of Audit Policy for Registry Object Access in Windows

We can easily configure or not configure the Audit Policy for Registry Object Access using Intune on Windows devices using Microsoft Intune or configure a custom OMA-URI setting. Below is a step-by-step guide to help to set this up.

  • Sign in to Microsoft Intune
  • Go to Devices Configuration
  • Click Create and then New policy
  • Choose the platform as Windows 10 and later
  • For Profile type, select Templates and then choose Custom
  • Provide a Name – e.g. Audit Registry Object Access Policy.
  • Add a Description if needed
  • Click on + Add under OMA-URI Settings to configure the specific setting.
  • To Configure the OMA-URI Setting, do the following
    • Enter a name for this setting, such as Audit Registry Object Access Policy.
    • Briefly describe the setting, e.g., “This policy setting allows you to audit attempts to access registry objects”.
  • Enter the following OMA-URI path
    • ./Device/Vendor/MSFT/Policy/Config/Audit/ObjectAccess_AuditRegistry
  • Set the Data type to Integer.
  • Enter the value
    • 1 to Success the Audit Registry for Object Access Policy.
    • 0 to Off/None in the Audit Registry for Object Access Policy.
  • After entering the above details, click Save.
How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.2
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.2

How to Configure Audit Policy for Registry Object Access in Windows using Intune

To start deploying a policy in Intune, simply sign in to the Microsoft Intune admin center. Once there, navigate to Devices > Configuration profiles, then click Create profile.

  • In the Create a Profile window, set the Platform to Windows 10 and later
  • Choose Settings catalog as the Profile type.
  • Finish up by clicking Create.
How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.3
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.3

The Basics step is where we can give our policy its essential details. Start by providing a clear Name so we can easily identify it later. Then add a short Description explaining its purpose. The Platform is already configured, so no action is needed there.

  • Click Next to proceed.
How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.4
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.4

Configuration Settings

Now, let’s move to Configuration Settings. This is where we will define what this policy actually does. Click Add Settings to open the Settings Picker. In the search bar, type Auditing, and then select Object_Access Audit Registry from the results.

How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.5
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.5

Once we have selected Object_Access Audit Registry and closed the Settings Picker, we will find it listed on the Configuration Settings page. By default, its status is showing as Off/None (Not configured).

How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.6
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.6

We can see that the Object_Access Audit Registry policy has three configurable options (more details are in Table 2). For this setting, I will choose Success (Value1), which means records successful attempts to access an object with an SACL.

How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.7
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.7

Scope Tags

In Intune, Scope Tags help you control who can see and modify this policy, keeping things organized and managing access. They’re optional, so you can just click Next if you don’t need to assign them.

How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.8
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.8

Assignments

The Assignments tab is where you decide which users or devices receive this policy. Under Include Groups, click Add Groups and choose the desired group from the list. The selected group will then appear in your assignments.

  • For example, I have chosen Test_HTMD_Policy for this policy.
  • After making the selection, click Next to continue.
How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.9
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.9

Review + Create

In the Review + Create we will see a full summary of the new policy. Check everything over, and if needed to change anything, hit Previous.

  • When all are ready, click Create to finish.
  • We will now get a notification confirming the policy, Audit Registry Object Access was created successfully.
How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.10
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.10

Device and User Check-in Status

We can verify the policy in the Intune Portal. Policy creation typically takes around 8 hours. If it’s taking longer, use the manual sync option in the Company Portal app on the device, then check the status again.

  • Go to Devices, then Configuration.
  • Click on the policy Audit Registry Object Access.
  • The Audit Registry Object Access policy status is succeeded (1).
How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.11
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.11

Client Side Verification

To check if the policy applied, use the Event Viewer on the client device. Navigate to Applications and Services Logs > Microsoft > Windows > Device Management > Enterprise Diagnostic Provider > Admin.

We can see a list of policies there. Use the Filter Current Log option on the right and search for Intune event 813. This event confirms that a text setting has been applied to a Windows 10 or 11 device and will display the specific setting.

MDM PolicyManager: Set policy int, Policy: (Object Access_Audit Registry), Area: (Audit), EnrollmentID requesting merge: (B1E9301C-8666-412A-BA2F-3BF8A55BFA62), Current User: (Device), Int: (0x1), Enrollment Type: (0x6), Scope: (0x0).

How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.12
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.12

How to Remove Assigned Group from Audit Registry Object Access Policy

We might need to remove a group from a policy assignment for security updates or to improve workflow. The image shows how to unassign a group from a policy. After removing it, remember to click Review + Save.

For detailed information, you can refer to our previous post – Learn How to Delete or Remove App Assignment from Intune using by Step-by-Step Guide.

How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.13
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.13

How to Deleting Audit Registry Object Access Policy from Intune

If we want to delete an Intune policy for security or operational reasons, here’s how to remove Audit Registry Object Access policy.

  • Navigate to Devices > Configurations.
  • Find the Audit Registry Object Access policy in the list.
  • Click the three dots (…) next to it.
  • Select Delete from the menu.

For detailed information, you can refer to our previous post – How to Delete Allow Clipboard History Policy in Intune Step by Step Guide.

How to Configure Audit Policy for Registry Object Access in Windows using Intune - Fig.14
How to Configure Audit Policy for Registry Object Access in Windows using Intune – Fig.14

Need Further Assistance or Have Technical Questions? 

Join the LinkedIn Page and Telegram group to get the latest step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.   

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM, Windows, Cloud PC, Windows, Entra, Microsoft Security, Career, etc. 

Leave a Comment