🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1811
ISM-1823 →

Event logs are protected from unauthorised modification and deletion.

Property Value
ISM Control ISM-1815
Revision 1
Updated Dec-23
Guideline Not provided
Section Event logging and monitoring
Topic Centralised event logging facility
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

Event logs are protected from unauthorized modification and deletion to preserve logs for incident response and compliance. RBAC in Microsoft Defender XDR and Microsoft Sentinel restricts access to event logs, preventing tampering and enabling centralized protection and monitoring.1

Justification

Event logs are a primary forensic artefact during incident response. Without tamper protection, an attacker with local admin or Domain Admin privileges can clear Windows Security/System/Application event logs (using wevtutil cl) or delete Log Analytics workspace data — effectively destroying the evidence trail needed to determine breach scope, dwell time, and lateral movement paths.

Centralising logs to a Log Analytics workspace with RBAC and an immutable delete lock decouples the log store from the endpoint, so even a fully compromised endpoint cannot retroactively erase its own audit trail. This is a core requirement of the ASD ISM and PSPF audit logging expectations.

Protected Event Logging (PowerShell) adds an additional layer: script block logs are encrypted with a public key before being written to the event log, meaning even a local administrator cannot read sensitive credential or token data captured during script execution without the corresponding private key.

Protection layer Mechanism Threat mitigated
Log Analytics RBAC Azure role assignment on workspace Unauthorised read/write/delete of log data
Workspace delete lock Azure Resource Lock (CanNotDelete) Accidental or malicious workspace deletion
Immutable blob export Azure Immutable Storage (WORM) Tamper/delete of exported log archive
Windows Event Log ACL Group Policy / ADMX_EventLog Local log modification by non-admin
Protected Event Logging PowerShell Group Policy Credential exposure in script block logs
Sentinel Analytics Rules Scheduled rule: detect log purge events Early detection of log tampering attempt

A Microsoft Sentinel analytics rule alerting on Windows Security Event ID 1102 (Windows audit log cleared) and ID 1100 (Event logging service stopped) provides near-real-time detection of log tampering attempts — closing the gap between action and response.

Design Decision

[!NOTE] The RBAC configuration will be applied in Microsoft Defender XDR and Microsoft Sentinel to protect event logs from tampering. Access controls will be enforced to restrict modification and deletion of event logs to authorized personnel.

Prerequisites

Implementation Steps

RBAC protection of event logs in Defender XDR and Sentinel

  1. Centralize event logs from Azure services into a Log Analytics workspace to enable RBAC enforcement and tamper protection.1

  2. Apply role-based access controls to the Log Analytics workspace to restrict write, read, and delete actions on event logs and related configuration.1

  3. Enable a lock on the Log Analytics workspace to block deletion, purge, and retention configuration changes.1

  4. Configure automated exports of log data to immutable storage (such as Immutable Storage for Azure Blob Storage) to prevent tampering.1

  5. Ensure privileged activity logs are stored with RBAC protections and monitored for modify and delete activities. Integrate with Defender XDR and Sentinel for centralized analysis.1

Windows 11 Security Event Log — Built-in Access Controls and Hardening

Windows 11 enforces access controls on the Security event log at the operating system level, providing a baseline of protection before any additional Group Policy or SIEM hardening is applied.

Default access control behaviour:

Principal Default permission Can clear Security log?
SYSTEM Read, Write No (clearing requires SeSecurityPrivilege)
BUILTIN\Administrators Read, Write, Clear Yes (requires elevated token — UAC prompt)
Standard Users No access No (Access is denied)
Network Service / Local Service Read only No

The Security event log channel is unique among Windows event logs: standard users receive no read access at all. Access to other channels (Application, System) is granted to standard users for read purposes, but the Security log is restricted exclusively to BUILTIN\Administrators and NT AUTHORITY\SYSTEM. This is enforced by the Windows Security Descriptor on the event log channel itself.

Clearing the Security event log requires privilege escalation:

Clearing the Security event log (wevtutil cl Security or via Event Viewer) requires the “Manage auditing and security log” user right (SeSecurityPrivilege), which is assigned by default only to BUILTIN\Administrators. Running this command without elevation produces Access is denied — even for users in the local Administrators group if UAC is active and the process is not elevated. Standard users cannot clear the log under any circumstances without first being granted the privilege explicitly.

Detection — Event IDs to monitor:

Event ID Channel Description Severity
1102 Security The audit log was cleared — includes the account name, domain, and logon ID of the user who cleared it Critical
1100 Security The Windows Event Log service was shut down — may indicate an attempt to suppress logging High
517 Security Legacy equivalent of 1102 on older systems Medium

These events should be forwarded to Microsoft Sentinel via Windows Event Forwarding or the Log Analytics agent and should trigger an immediate analytics alert, as log clearing during an active session is a strong indicator of attacker anti-forensics activity.7

Further hardening via Group Policy (Intune Settings Catalog):

The default ACL on the Security log can be explicitly enforced or further restricted using the Channel_Log_FilePermissions_1 ADMX-backed policy to define an SDDL string on the Security channel.4

  1. In Intune > Devices > Configuration > + Create policy > Settings Catalog.
  2. Search for Event Log Service and locate Security: Control Event Log Access.
  3. Set the SDDL value to restrict access. The default Windows SDDL grants Administrators full control and denies all others:
O:BAG:SYD:(A;;0xf0007;;;SY)(A;;0x7;;;BA)(A;;0x3;;;BO)(A;;0x5;;;SO)(A;;0x1;;;IU)(A;;0x3;;;SU)(A;;0x1;;;S-1-5-3)(A;;0x2;;;S-1-5-33)(A;;0x2;;;S-1-5-32-573)
  1. To alert on any changes to this policy, enable Audit Policy Change (Event ID 4719) in the audit policy and forward those events to Sentinel.4

[!NOTE] Removing the “Manage auditing and security log” user right from Administrators entirely (SeSecurityPrivilege via User Rights Assignment GPO) will prevent all local log clearing — including by helpdesk and IT administrators. This is the highest-assurance configuration but can complicate legitimate incident response activities. Consider using this setting only on high-value or classified workloads, or as a compensating control on machines where log clearing should never be required.

Lock a Retention Policy to Prevent Removal (Preservation Lock)

Microsoft Purview retention policies can be made permanently immutable by applying a Preservation Lock. Once locked, no administrator — including a Global Administrator — can disable, delete, or make the policy less restrictive. The retention duration can only be extended, never shortened.8

[!WARNING] Applying a Preservation Lock is irreversible through normal administrative means. Once enabled, the policy is permanently bound to its retention duration and scope. The only mechanism for removal is a formal written request submitted to Microsoft by an authorised legal representative of the organisation, confirming the regulatory basis for the change. This cannot be performed by IT administrators or even Microsoft Support without that legal authorisation. Only apply a Preservation Lock after the retention policy has been fully reviewed, tested, and confirmed correct.

When to apply Preservation Lock:

To apply a Preservation Lock to an existing retention policy:

Preservation Lock is intentionally unavailable in the Purview portal UI to prevent accidental activation. It must be applied via PowerShell only.

  1. Connect to Security & Compliance PowerShell:
Connect-IPPSSession
  1. Apply Preservation Lock to the target policy by name:
Set-RetentionCompliancePolicy -Identity "Your-Policy-Name" -RestrictiveRetention $true
  1. Confirm the lock has been applied:
Get-RetentionCompliancePolicy -Identity "Your-Policy-Name" | Select-Object Name, RestrictiveRetention

The RestrictiveRetention property must return True to confirm the lock is active.8

[!NOTE] Once locked, Set-RetentionCompliancePolicy will reject any attempt to shorten the retention period, narrow the scope, or delete the policy. Only extending the retention duration is permitted. Any modification or removal of the lock requires a formal legal request from the organisation’s authorised legal representative submitted directly to Microsoft. This process is specifically designed for regulatory compliance scenarios where the organisation must demonstrate to an external auditor or regulator that records cannot be altered or deleted by any internal party.

HOME ← ISM-1811
ISM-1823 →