• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1896
  • Last Modified:

"Audit account logon events" VRS "Audit logon events"


"Audit account logon events" and "Audit logon events", I need someone to clarify the differences between these two audit types, I am very confused!  I have traditionally only used "Audit logon events" to track success/failure logon attempts from a client to the domain.  The more I read the descriptions for these events the more confused I get.  

Can you give me examples of use, mainly for "Audit account logon events"?

 
Here are the descroptions from 2003 help.
-------------------------------------------------------------------------

Audit account logon eventsDescription:

This security setting determines whether to audit each instance of a user logging on to or logging off from another computer in which this computer is used to validate the account. Account logon events are generated when a domain user account is authenticated on a domain controller. The event is logged in the domain controller's security log. Logon events are generated when a local user is authenticated on a local computer. The event is logged in the local security log. Account logoff events are not generated.

If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry when an account logon attempt succeeds. Failure audits generate an audit entry when an account logon attempt fails.

To set this value to No auditing, in the Properties dialog box for this policy setting, select the Define these policy settings check box and clear the Success and Failure check boxes.

If success auditing for account logon events is enabled on a domain controller, an entry is logged for each user who is validated against that domain controller, even though the user is actually logging on to a workstation that is joined to the domain.

Default: Success.

-------------------------------------------------------------------------

Audit logon eventsDescription:

This security setting determines whether to audit each instance of a user logging on to or logging off from a computer.

Account logon events are generated on domain controllers for domain account activity and on local computers for local account activity. If both account logon and logon audit policy categories are enabled, logons that use a domain account generate a logon or logoff event on the workstation or server, and they generate an account logon event on the domain controller. Additionally, interactive logons to a member server or workstation that use a domain account generate a logon event on the domain controller as the logon scripts and policies are retrieved when a user logs on. For more information about account logon events, see Audit account logon events.

If you define this policy setting, you can specify whether to audit successes, audit failures, or not audit the event type at all. Success audits generate an audit entry when a logon attempt succeeds. Failure audits generate an audit entry when a logon attempt fails.

To set this value to No auditing, in the Properties dialog box for this policy setting, select the Define these policy settings check box and clear the Success and Failure check boxes.

Default: Success.


Thanks

Super Play



0
superplay
Asked:
superplay
2 Solutions
 
Justin CAWS Solutions ArchitectCommented:
As I understand it, Account Logon events are generated on the system that does the actual authentication, the DC, and Logon events are generated on the machine that account is logging in to(not necessarily the machine that actually authenticated the account).  

MS Press's Windows Server 2003 Administrator's Companion simply states:

Account Logon - Generated when a DC recieves a logon request.
Logon - Generated when a user logs on or off.


-BR
0
 
pashanahanCommented:
Hi there,

http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/518.asp

If both account logon and logon audit policy categories are enabled, logons that use a domain account generate a logon or logoff event on the workstation or server, and they generate an account logon event on the domain controller. Additionally, interactive logons to a member server or workstation that use a domain account generate a logon event on the domain controller as the logon scripts and policies are retrieved when a user logs on.

Account Logon Event > When the user 1st logs onto any domain client > Generated on the DC when a user logs onto a domain computer and is authenticated by the DC
Logon Event > Generated whenever the user accesses a resource on a member server / different client from the local one where he/s is logged in  

So to audit successful logins to the domain you would use "Account Logon Event" to track remote share/resource usage then you would use "Logon Event"

Aid



0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now