This extension is intended to work locally on the AD server. It executes:
- PowerShell cmdlets, locally, to access Windows registry and specific AD metrics available only through PowerShell. Several of these metrics map to metrics available through commonly used DCDIAG tool.
- API calls against the OS Service Monitoring, to report AD services availability
- Log ingestion of the AD services logs
The extension package contains:
- PowerShell snippets that retrieve metrics from the AD server
- Alert templates for time skew monitoring, database file space, ATQ thread usage and replication consistency
- Topology rules and screen definitions that weave this extension metrics into the entities managed by the Active Directory services monitoring extension
- Log ingest rules, applied on AD hosts monitored with this extension, which further enable alerting on AD services-related issues logged into Windows logs system
- Log processing rules, which enrich logs ingested with a field that flag AD-related context where content pertains to AD services
- Log event extraction rules, which scan logs ingested for AD-related context and trigger alerts when log information carries potential AD issue or error information
Log ingest configured by this extension
By default, this extension sets up log ingestion rules on hosts where it is installed. AD services logs are used to generate events and further alert on service anomalies and malfunctions.
You can disable log ingestion with a settings toggle in the extension configuration screen. Note that this setting does not control any other log ingestion rules that might have been configured on hosts where this extension has been activated.
Following log ingestion rules are being set up by this extension:
- Windows Event Log
- source is
- Active Directory Web Services
- DFS Replication
- Directory Service
- DNS Server
- and log record level is in (ERROR WARN CRITICAL SEVERE)
- Windows Log
- source is
- Windows Application Log
- Windows System Log,
- Security
And the following events from each event provider.
|Event Provider|Event IDs|
|Microsoft-Windows-ADFS|102, 104, 111, 356, 385, 509, 546, 549, 1034, 1036|
|Microsoft-Windows-Directory-Services-SAM|12299, 16643|
|Microsoft-Windows-Time-Service|21, 34, 36|
|DNSAPI|11150, 11162, 11151, 11155, 11163, 11167, 11154, 11166, 11152, 11153, 11164, 11165|
|Microsoft-Windows-Kerberos-Key-Distribution-Center|6, 15, 17|
|Microsoft-Windows-Security-Auditing|1102, 4616, 4621, 4649, 4660, 4675, 4707, 4710, 4712, 4715, 4716, 4730, 4740, 4743, 4764, 4766, 4771, 4866, 4867, 4935, 5025, 5030, 5034, 5035, 5037, 5139, 5141, 5483, 5484, 6008, 6145|
|Microsoft-Windows-CertificationAuthority|0, 3, 5, 9, 16, 17, 19, 20, 21, 22, 23, 28, 33, 34, 35, 38, 39, 40, 42, 43, 44, 48, 49, 51, 59, 60, 63, 65, 74, 75, 78, 82, 83, 86, 87, 90, 92, 94, 95, 96, 98, 99, 100, 102, 106, 107, 130, 132|
|Microsoft-Windows-OnlineResponder|39, 60, 92|