Deploy Intune Audit IPsec Driver Policy

This post will take you through the Intune Audit IPsec Driver Policy deployment. We’ll make use of Intune’s Settings Catalog to enforce this policy. Configuration Profiles of Intune will be used to accomplish this task.

Audit IPsec, Driver Policy configuration, enables the auditing of events produced by the IPsec filter driver, encompassing the following scenarios: initiation and termination of IPsec services, rejection of network packets due to integrity check failure, rejection of network packets due to replay check failure, rejection of network packets for being in plaintext, and reception of network packets with an incorrect Security Parameter Index (SPI).

This might signal issues with the network card or the need for driver updates. Additionally, the policy covers the inability to process IPsec filters. An audit event is triggered for each IPsec filter driver operation when this policy setting is applied.

Successful attempts are documented as Success audits, while unsuccessful attempts are logged as Failure audits. Failure to configure this policy setting results in the absence of audit events for IPsec filter driver operations.

Patch My PC
Deploy Intune Audit IPsec Driver Policy Fig.1
Deploy Intune Audit IPsec Driver Policy Fig.1

Deploy Intune Audit IPsec Driver Policy

To Deploy Intune Audit IPsec Driver Policy, follow the steps stated below:

  • Sign in to the Intune Admin Center portal https://intune.microsoft.com/.
  • Select Devices > Windows > Configuration profiles > Create a profile.

In Create Profile, I select Windows 10 and later in Platform and select Profile Type as Settings catalog. Click on the Create button.

Deploy Intune Audit IPsec Driver Policy Fig.2
Deploy Intune Audit IPsec Driver Policy Fig.2

On the Basics tab pane, I provide a name for the policy as “Audit IPsec Driver Policy.”

  • Optionally, if you want, you can enter a policy description and proceed by selecting “Next“.
Deploy Intune Audit IPsec Driver Policy Fig.3
Deploy Intune Audit IPsec Driver Policy Fig.3

Now in Configuration Settings, Click Add Settings to browse or search the catalog for the settings I want to configure.

Adaptiva
Deploy Intune Audit IPsec Driver Policy Fig.4
Deploy Intune Audit IPsec Driver Policy Fig.4

In the Settings Picker windows. I searched for the keyword Audit. I found the category Auditing and selected this.

When I select that option as stated above, I see the sub-category System Audit I Psec Driver. After selecting that, click the cross mark at the right-hand corner, as shown below.

Deploy Intune Audit IPsec Driver Policy Fig.5
Deploy Intune Audit IPsec Driver Policy Fig.5

Here in System Audit I Psec Driver, there are multiple options to select, which are:

  • Off/ None
  • Success
  • Failure
  • Success + Failure

Here I choose Success + Failure for this policy.

Deploy Intune Audit IPsec Driver Policy Fig.6
Deploy Intune Audit IPsec Driver Policy Fig.6

Using Scope tags, you can assign a tag to filter the profile to specific IT groups. One can add scope tags (if required). More details on Intune Scope Tags Implementation Guide.

  • Click Next to continue.

Now in Assignments, in Included Groups, you need to click on Add Groups and choose Select Groups to include one or more groups. Click Next to continue.

Deploy Intune Audit IPsec Driver Policy Fig.7
Deploy Intune Audit IPsec Driver Policy Fig.7

In the Review + Create tab, I review settings. After clicking on Create, changes are saved, and the profile is assigned.

Deploy Intune Audit IPsec Driver Policy Fig.8
Deploy Intune Audit IPsec Driver Policy Fig.8

After successfully creating the “Audit IPsec Driver Policy,” a notification will appear in the top right-hand corner confirming the action. You can also verify the policy’s existence by navigating to the Configuration Profiles list, where it will be prominently displayed.

Your groups will receive your profile settings when the devices check in with the Intune service. The Policy applies to the device.

Intune Report for Audit IPsec Driver Policy

From the Intune Portal, you can view the Intune settings catalog profile report, which provides an overview of device configuration policies and deployment status.

To track the assignment of the policy, you need to select the relevant policy from the Configuration Profiles list. Then, you can review the device and user check-in status to determine whether the policy has been successfully applied.

  • If you require more detailed information, you can click on “View Report” to access additional insights.
Deploy Intune Audit IPsec Driver Policy Fig.9
Deploy Intune Audit IPsec Driver Policy Fig.9

Intune MDM Event Log – Audit IPsec Driver Policy

To verify the successful implementation of String or integer policies for Audit IPsec Driver Policy on Windows 10 or 11 devices through Intune, you can leverage event IDs 813 and 814.

These event IDs provide valuable insights into the Audit IPsec Driver Policy‘s application status and the specific value assigned to the policy on those devices. In the case of this particular policy, the value is an Integer and is linked to the event ID 813.

By analyzing these event IDs, you can gain a clear understanding of the policy’s application status and the corresponding value associated with it on the devices in question.

To confirm this, you can check the Event log path – Applications and Services Logs – Microsoft – Windows – Devicemanagement-Enterprise-Diagnostics-Provider – Admin.

MDM PolicyManager: Set policy string, Policy: (System_AuditlPsecDriver), Area: (Audit), EnrollmentID requesting merge: (5B88AEF1-09E8-43BB-B144-7254ACBBDF3E), Current User: (Device), Int: (0x3), Enrollment Type: (0x6), Scope: (0x0).

Deploy Intune Audit IPsec Driver Policy Fig.10
Deploy Intune Audit IPsec Driver Policy Fig.10

When I opened the above Event log, I found that the Audit IPsec Driver Policy I applied to the device was successfully implemented.

  • By reviewing the log entry shown in the above image, the Event Viewer, I came across essential information, including the Area and Enrollment ID.

These details play a significant role in identifying the corresponding registry path. To locate the specific information, please consult the table provided below:

AreaPolicyIntegerScopedEvent ID
AuditSystem_AuditlPsecDriver3Device813
Table 1 – Deploy Intune Audit IPsec Driver Policy

The details presented in the table above for the Deploy Intune Audit IPsec Driver Policy can be employed to access the registry settings that hold the group policy configurations on a specific computer. To accomplish this, you can execute “REGEDIT.exe” on the target computer and navigate to the precise registry path where these settings are stored.

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\providers\5B88AEF1-09E8-43BB-B144-7254ACBBDF3E\default\Device\Audit

When you navigate the above path in the Registry Editor, you will find the registry key named System_AuditlPsecDriver. Also, when I navigated to the above path, I saw that the Registry Key was created successfully.

Registry NameValue
System_AuditlPsecDriver3
Table 2 – Deploy Intune Audit IPsec Driver Policy
Deploy Intune Audit IPsec Driver Policy Fig.11
Deploy Intune Audit IPsec Driver Policy Fig.11

We are on WhatsApp. To get the latest step-by-step guides and news updates, Join our Channel. Click hereHTMD WhatsApp.

Author

Abhinav Rana is working as an SCCM and Intune Admin with several years of experience. He loves to help the community by sharing his knowledge. He is a B.Tech graduate in Information Technology.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.