Solved

Auditing tool

Posted on 2003-10-28
5
319 Views
Last Modified: 2010-04-14
Normally, administrator need to enable auditing for the resource, but in large domain, it is hard to enable all the resource on all the PC, Is there any tool to audit the user's activity in win 2k domain - when, what and where ?

0
Comment
Question by:joehuang
  • 3
  • 2
5 Comments
 
LVL 10

Expert Comment

by:Luxana
ID: 9639725
Hallo joehuang

Windows 2000 has 2 Audit Policy Settings;


1 - Audit account logon events

2 - Audit logon events

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/windows2000serv/maintain/monitor/logevnts.asp
 


0
 
LVL 10

Expert Comment

by:Luxana
ID: 9639743
0
 

Author Comment

by:joehuang
ID: 9642523
Luxana,

The most diffcult request is,
For example, There are 1000 files or directory in PC, I need to enable the "audit object access" in GPO, then go to each PC, right click each partition/driver | property | security | advanced | auditing | add everyone | select reset all on child object.., there are 200 PCs that I need repeat same setting, Next, they will creat a huge log file on each PC.  Is there any way to simplify this type of job ? I hown this example is kind weird, But I just try to find a way to answer the request from my top level guy, "how do you know which files is accessd by who?", "How many PC this user acces to and What files are accessed by the user?".
0
 
LVL 10

Accepted Solution

by:
Luxana earned 20 total points
ID: 9647244
hallo joehang

I understand,
You probably read all of this stuff but just in case:

http://support.microsoft.com/default.aspx?scid=kb;en-us;Q300549&sd=tech

I hope that you get answer otherwise......
0
 

Author Comment

by:joehuang
ID: 9650937
Thanks for all the information.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Note: This is the second blog post in a series on email clearinghouses (https://www.xmatters.com/alert-management/blog-email-has-failed-us?utm_campaign=70138000000ydLoAAI&utm_source=exex&utm_medium=article&utm_content=blog-post).   Every month t…
This is a video that shows how the OnPage alerts system integrates into ConnectWise, how a trigger is set, how a page is sent via the trigger, and how the SENT, DELIVERED, READ & REPLIED receipts get entered into the internal tab of the ConnectWise …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

939 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now