For a few weeks, I’m struggling with the problem of a group of end-users who aren’t allowed to access the internet. In the situation, there is a Meraki MX 100 as Firewall behind this device an L3 Core Switch and then some L2 Switches and clients.
Meraki Group Policy and AD Security Group
We had a Group Policy within the Meraki: This Group Policy had a certain name however, it wasn’t clear that this group should have also the same name within the Active Directory
How to create a Group Policy:
We renamed the AD Group to the same name as the Policy in the Meraki. We thought this was good. but still, no systems which got blocked. Or in the event log of the Meraki. After having several calls with Meraki support and every time we got some different answers.
After following the following post of meraki several times.
We and contact with the support we had to look to the AD / Group Policy settings. I noticed that one thing wasn’t possible to change on the Domain Controllers. You
The Current domain and forest level is 2012R2. This was done after all old domain controllers were gone from the network. In this case, you need to change the audit settings on a different location, within the default domain controller policy.
To Change this you need to edit the Default Domain Controller Policy.
What do you need to change for these settings are the following:
- Open Group Policy Management Console(GPMC).
- Edit “Default Domain Controllers Policy”.
- Configure required,
- Advanced Audit Polices required for Active Directory auditing (recommended for 2k8 and above Domain Controllers)
LogonEvents: Select Account Logon
- Audit ‘Kerberos Authentication Service’ (Success & Failure).
- Audit User, Group, Computer: Select Account Management
- Audit ‘Computer Account Management’ (Success),
- Audit ‘Distribution Group Management’ (Success),
- Audit ‘Security Group Management’ (Success),
- Audit ‘User Account Management’ (Success & Failure).
- Audit Tracking Processes: Select Detailed Tracking
- Audit Process Creation (Success),
- Audit Process Termination (Success).
- Audit GPO, OU, Configuration, Schema, Contacts, Containers, Sites, DNS: Select DS Access
- Audit Directory Services Changes (Success),
- Audit Directory Service Access (Success).
Logon/ Logoff: Select Logon / Logoff
Logon(Success & Failure),
- Audit Logoff (Success),
- Audit Network Policy Server (Success & Failure),
- Audit Other Logon / Logoff Events (Success).
- Audit Scheduled Tasks: Select Object Access
- Audit Other Object Access Events (Success).
- Audit Local Policy Changes: Select Policy Change
- Audit Authentication Policy Change (Success),
- Audit Authorization Policy Change (Success).
- Audit System Events: Select System
- Audit Security State Change (Success).
After you configured this you need to use the command gpupdate / force to force the change of the policy to the domain controllers within the network.
When you changed it, you will see within a notable time changes on the client page as well in the event log with warnings that sites are blocked for certain users.