Solved

Auditing tool

Posted on 2003-10-28
5
322 Views
Last Modified: 2010-04-14
Normally, administrator need to enable auditing for the resource, but in large domain, it is hard to enable all the resource on all the PC, Is there any tool to audit the user's activity in win 2k domain - when, what and where ?

0
Comment
Question by:joehuang
  • 3
  • 2
5 Comments
 
LVL 10

Expert Comment

by:Luxana
ID: 9639725
Hallo joehuang

Windows 2000 has 2 Audit Policy Settings;


1 - Audit account logon events

2 - Audit logon events

http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/windows2000serv/maintain/monitor/logevnts.asp
 


0
 
LVL 10

Expert Comment

by:Luxana
ID: 9639743
0
 

Author Comment

by:joehuang
ID: 9642523
Luxana,

The most diffcult request is,
For example, There are 1000 files or directory in PC, I need to enable the "audit object access" in GPO, then go to each PC, right click each partition/driver | property | security | advanced | auditing | add everyone | select reset all on child object.., there are 200 PCs that I need repeat same setting, Next, they will creat a huge log file on each PC.  Is there any way to simplify this type of job ? I hown this example is kind weird, But I just try to find a way to answer the request from my top level guy, "how do you know which files is accessd by who?", "How many PC this user acces to and What files are accessed by the user?".
0
 
LVL 10

Accepted Solution

by:
Luxana earned 20 total points
ID: 9647244
hallo joehang

I understand,
You probably read all of this stuff but just in case:

http://support.microsoft.com/default.aspx?scid=kb;en-us;Q300549&sd=tech

I hope that you get answer otherwise......
0
 

Author Comment

by:joehuang
ID: 9650937
Thanks for all the information.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In Part II of this series, I will discuss how to identify all open instances of Excel and enumerate the workbooks, spreadsheets, and named ranges within each of those instances.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question