How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune

Let’s discuss How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune. Object Access auditing focuses on tracking access attempts to defined objects or object types on a network or a computer and includes 14 subcategories for more detailed tracking.

With Advanced Audit Policy Configuration, you gain very specific control over what activities are tracked. This helps you detect both failed and successful attacks on your network and important data, and also ensures you’re meeting the required regulations for managing crucial company assets.

This security policy setting in Windows allows administrators to track and review events generated by applications that utilize the Windows auditing Application Programming Interfaces (APIs). When applications are designed to use these APIs, they log their auditing-related activities under this specific subcategory.

If an application uses this feature, this setting allows you to audit things like when an application starts, stops, or gets ready, along with other specific actions the application chooses to use Windows Auditing APIs. It helps you monitor what these particular applications are doing.

Patch My PC

What Application Actions does the Audit Application Generated Policy for Object Access Auditing Track?

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune

When the Audit Application Generated Policy for Object Access Auditing policy is enabled, the system records specific events such as the creation, deletion, and initialization of an application client context. Additionally, it can capture other application-specific operations that utilize the Windows Auditing APIs, offering a detailed view of how applications interact with protected resources.

Object Access_Audit Application Generated Policy

This setting would be found within the Audit Policy section of the Windows CSP, specifically under subcategories related to Object Access. The following section will showcase the detailed view of the Object Access_Audit Application Generated Policy through Windows CSP.

Description framework properties

Property nameProperty value
Formatint
Access TypeAdd, Delete, Get, Replace
Default Value0
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Table 1

Allowed Values

Allowed values are used to control which resources a webpage is allowed to load, based on specified directives and sources.

ValueFeaturesDescription
0 (Default)Off/NoneNothing is recorded
1SuccessOnly successful actions are recorded
2FailureOnly failed actions are recorded.
3Success+FailureBoth successful and failed actions are recorded.
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Table 2

Group Policy Mapping

Group Policy Mapping or Group Policy Analytics in Microsoft Intune helps you migrate your existing GPOs to the cloud. The following table will show the Group Policy Mapping of the Audit Application Generated Policy for Object Access Auditing in Intune.

NameValue
NameAudit Application Generated
PathWindows Settings > Security Settings > Advanced Audit Policy Configuration > System Audit Policies > Object Access
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Table 3

./Device/Vendor/MSFT/Policy/Config/Audit/ObjectAccess_AuditApplicationGenerated

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune
 - Fig.1 (Credits to MS)
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.1 (Credits to MS)

Steps to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune

To create a new policy, begin by logging into the Intune Admin Center. Once inside, navigate to Devices and then select Configuration. Under Policies, click on the dropdown arrow next to Create and choose New policy. Next, you’ll need to specify the platform for this policy (in this instance, select Windows 10 and later). Finally, for the profile type, choose Settings catalog, and then click Create to proceed with configuring your new policy.

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.2
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.2

Basics

When we start creating a new policy, the Basics tab is where we begin. We must give our policy a Name here. There is also the option to add a Description. The Platform chose in the previous step will already be shown on this tab.

  • Policy Name: Audit Application Generated Policy for Object Access Auditing
  • Description: How to Configure the Audit Application Generated Policy for Object Access Auditing in Intune
  • Platform: Windows
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.3
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.3

Configuration Settings

The Configuration settings area is where we define the details of our policy. To start adding these details, click Add settings on the configuration page. This will open the Settings Picker window, allowing choose different categories of settings.

  • Category: Auditing
  • Settings Name: Object Access_Audit Application Generated
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.4
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.4

Once chosen the settings in the picker and close it, wll be redirected to the main configuration settings window. Here, we will notice that the Object Access_Audit Application Generated policy offers three configurable settings (refer to Table 2 for further details).

  • Here, I select Success, which means that if we enable this setting, only successful actions are recorded.
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.5
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.5

Scope Tags

The following stage involves Scope Tags. This feature allows you to assign scope tags to the policy as part of the creation process. However, for this particular policy, applying scope tags is not required, so we will bypass this step. Click Next to continue.

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.6
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.6

Assignments

In the Assignments section, we must specify a group to be added to the Included group. This chosen group is where the policy will be applied. If we skip this vital step, the policy won’t be successfully deployed. Once we have selected the correct group, click Next to continue.

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.7
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.7

Review + Create

The last step before the policy implementation is Review + Create. Here, we will see a summary of everything we have set up for this policy. This includes important information like the policy’s name, any descriptions added, the chosen platform, and other relevant details.

  • After thoroughly reviewing, click Create to finalize the policy.
How to Configure the Audit Application Generated Policy for Object Access Auditing in Intune - Fig.8
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.8

Monitoring Status

After you create the policy, a notification confirms its successful creation. You can then check the newly created Audit Application Generated Policy for Object Access Auditing policy in the Intune Portal.

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.9
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.9

Device and User Check-in Status

New device policies take about 8 hours to apply automatically. To make it faster, we can manually sync the policies. After syncing, check if the policy was successfully applied by looking at its status under Device > Configuration in Intune and selecting the specific policy.

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.10
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.10

Client-Side Verification

Client-side verification involves checking the status of the policies, allowing confirmation if they’ve been applied. On Windows 11 or 10 devices, successful application of a string policy is indicated by event IDs 813 or 814, which can be found in the Applications and Services Logs > Microsoft > Windows > Devicemanagement-Enterprise-Diagnostics-Provider > Admin path.

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.11
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.11

Remove Assigned Group

Removing a group from a policy assignment is often necessary for security updates or better workflow management. The image below shows how to remove a group that’s currently assigned to the policy. After the removal, be sure to click Review + Save.

For detailed information, you can refer to our previous post – Learn How to Delete or Remove App Assignment from Intune using by Step-by-Step Guide.

How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune - Fig.12
How to Configure Files, Folders and Registry Keys Access Auditing Application Policy in Intune – Fig.12

Deleting a Policy From Intune

There are several reasons why we might need to delete a policy in Microsoft Intune, such as implementing security updates or refining operational processes. The screenshot below illustrates how to do this.

For detailed information, you can refer to our previous post – How to Delete Allow Clipboard History Policy in Intune Step by Step Guide.

How to Configure the Audit Application Generated Policy for Object Access Auditing in Intune - Fig.13
How to Configure the Audit Application Generated Policy for Object Access Auditing in Intune – Fig.13

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the latest step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on Microsoft Technologies. We are there on Reddit as well.

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM, Windows, Cloud PC, Windows, Entra, Microsoft Security, Career, etc.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.