Table of Contents
Remote Procedure Call (RPC) Service
  - Computer Configuration > Windows Settings > Security Settings > System Services
    
      - Right-click “Remote Procedure Call (RPC)” and select “Properties”
 
      - Click-on “Define this policy setting” and select “Automatic”
 
      - Click-on “Apply” and then, “OK”
 
    
   
Logging the “Sexy Six” Windows Event IDs
  - Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options
    
      - Right-click “Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings”
 
      - Select “Properties”
 
      - Select “Define this policy setting:” and “Enabled”
 
      - Click-on “Apply” and then, “OK”
 
    
   
  - Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies
    
      - Expand these categories and select “Configure the following audit events:” and “Success”
        
          - Detailed Tracking > Audit Process Creation
 
          - Object Access > Audit File Share
 
          - Object Access > Audit File System
 
          - Object Access > Audit Registry
 
          - Object Access > Audit Filtering Platform Connection
 
        
       
      - Expand these categories and select “Configure the following audit events:”, “Success”, and “Failure”
        
          - Logon/Logoff > Audit Logon
 
        
       
    
   
Windows Remote Management (WinRM)
TLDR
  - Configure the WinRM service to start automatically
 
  - Configure the WinRM service to listen for HTTP requests on all available NICs
 
  - Configure Windows Firewall with Advanced Security to allow inbound connections to the WinRM service
 
  - Configure Windows Defender to allow remote administration
 
  - Link the “WinRM” Group Policy Object to the domain
 
  - Computer Configuration > Windows Settings > Security Settings > System Services
    
      - Right-click “Windows Remote Management” and select “Properties”
 
      - Click-on “Define this policy setting” and select “Automatic”
 
      - Click-on “Apply” and then, “OK”
 
    
   
  - Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Remote Management (WinRM) > WinRM Service
    
      - Right-click on “Allow remote server management through WinRM” and select “Edit”
 
      - Select “Enabled”
 
      - Type an asterisk (*) into the “IPv4 filter” field
 
      - Click-on “Apply”
 
      - Click-on “OK”
 
    
   
  - Computer Configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Defender Firewall with Advanced Security > Windows Defender Firewall with Advanced Security
    
      - Right-click-on “Inbound Rules” and select “New Rule”
 
      - Select “Predefined” and then, “Windows Remote Management”
 
      - Click-on “Next”
 
      - Remove the check from the “Public” profile
 
      - Click-on “Next”
 
      - Select “Allow the connection”
 
      - Click-on “Finish”
 
    
   
  - Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Defender Firewall > Domain Profile
    
      - Right-click on “Windows Defender Firewall: Allow inbound remote administration exception” and select “Edit”
 
      - Select “Enabled”
 
      - Type an asterisk (“*”) into the IPv4 field
 
      - Click-on “Apply”
 
      - Click-on “OK”
 
    
   
Windows Event Forwarding (WEF)
TLDR
  - Configure Windows Remote Management
 
  - Configure clients to log the Sexy Six Windows Event IDs
 
  - Configure clients to forward events to your Event Collectors
 
  - Authorize the Network Service (SID: 
S-1-5-20) access to logs you wanted collected (ex: Security Logs) 
  - Link the “WEF” Group Policy Object to the domain
 
  - Computer Configuration > Policies > Administrative Templates > Windows Components > Event Forwarding
    
      - Right-click “Configure target Subscription Manager” and select “Edit”
 
      - Select “Enabled”
 
      - Click-on “Show…”
 
      - Add an entry like below to the “Value” field for each “Event Collector”:
        
          Server=http://dc1.vanilla.sky.net:5985/wsman/SubscriptionManager/WEC,Refresh=60 
        
       
      - Click-on “Apply”
 
      - Click-on “OK”
 
    
   
  - Computer Configuration > Polices > Administrative Templates > Windows Components > Event Log Service > Security
    
      - Right-click “Configure log access” and select “Edit”
 
      - Select “Enabled”
 
      - Add an entry like below to the “Log Access” field:
        
          O:BAG:SYD:(A;;0xf0007;;;SY)(A;;0x7;;;BA)(A;;0x1;;;BO)(A;;0x1;;;SO)(A;;0x1;;;S-1-5-32-573)(A;;0x1;;;S-1-5-20) 
        
       
    
   
Windows Event Collection (WEC)
TLDR
  - Configure Windows Event Forwarding (WEF)
 
  - Configure the WEC service to start automatically
 
  - Configure Event Collectors to subscribe to the Sexy Six Windows Event IDs
 
  - Link the “WEC” Group Policy Object to your Event Collectors
 
  - Computer Configuration > Windows Settings > Security Settings > System Services
    
      - Right-click “Windows Event Collector” and select “Properties”
 
      - Click-on “Define this policy setting” and select “Automatic”
 
      - Click-on “Apply” and then, “OK”
 
    
   
  - Click-on “Subscriptions”
 
  - If prompted with the message below, select “Yes”
    
      To work with subscriptions, the Windows Event Collector Service must be running and configured. Do you want to start the service and/or configure it to automatically start when the the computer is restarted? 
    
   
  - Click-on “Create Subscription…”
 
  - Specify the following and click-on “OK”
    
      - Subscription name: 
Forwarded Events 
      - Subscription type: 
Source computer initiated 
      - Source computers: 
Domain Computers 
      - Events to Collect:
        
          - Event level: 
Critical, Warning, Verbose, Error, Information 
          - By log - Event logs: 
Application, Security, System 
          - Event IDs: 
4688,4624,5140,4663,4657,5156 
        
       
    
   
Startup Scripts
  - Open the “Group Policy Management” snap-in
 
  - Right-click “Group Policy Objects” and select “New”
 
  - Name your GPO when prompted
 
  - Right-click your newly created GPO and select “Edit…”
 
  - Under “Computer Configuration,” click-on “Polices > Windows Settings > Scripts (Startup/Shutdown)”
 
  - Double-click “Startup”
 
  - Click-on the “PowerShell Scripts” tab
 
  - Click-on “Show Files…”
 
  - Copy & paste your script and any files it requires to this window
 
  - Click-on “Add…” and browse to where you uploaded your script
 
  - Highlight your script and click-on “Open”
 
  - Specify any script parameters and then, click-on “OK”
    
      - Don’t forget to link your existing GPO to the relevant OU
 
      - Run 
gpupdate /force; shutdown /r /t 000 when testing your startup script 
    
   
References