Query Details
# Active Directory - Group Policy Objects (WORK IN PROGRESS) ## Query Information ### Description KQL queries to find Active Directory Group Policy changes #### References ### Microsoft Defender XDR ```kql IdentityDirectoryEvents | where ActionType == @"Group Policy was created" | extend GroupPolicyName = tostring(parse_json(AdditionalFields).GroupPolicyName) ``` ```kql IdentityDirectoryEvents | where ActionType == @"Group Policy settings were changed" ``` ```kql DeviceEvents | where ActionType == @"DirectoryServiceObjectCreated" | where parse_json(AdditionalFields)["ObjectClass"] == 'groupPolicyContainer' ``` ```kql IdentityDirectoryEvents | where ActionType == @"Group Policy settings were changed" ``` ```kql IdentityDirectoryEvents | where ActionType == @"Group Policy Display Name changed" ```
This query is a work-in-progress set of KQL (Kusto Query Language) queries designed to track changes related to Active Directory Group Policy Objects (GPOs). Here's a simple breakdown of what each part of the query does:
Identify Newly Created Group Policies:
Detect Changes to Group Policy Settings:
Track Creation of Group Policy Containers:
Monitor Changes to Group Policy Settings:
Identify Changes to Group Policy Display Names:
Overall, these queries are used to monitor and track various changes to Group Policies within an Active Directory environment, which can be crucial for security and compliance purposes.

Alex Verboon
Released: May 19, 2025
Tables
Keywords
Operators