Solved

Where are our log files?

Posted on 2004-08-02
2
150 Views
Last Modified: 2010-04-13
We have set up a group policy within the default domain policy, specifically the audit policy, yet we have not received any information into the event logs.  Why would this be?
0
Comment
Question by:constance_gould
2 Comments
 
LVL 67

Expert Comment

by:sirbounty
ID: 11699998
There's two steps to enabling file auditing.
1) Enable auditing:  http://support.microsoft.com/?kbid=248260
2) Determine what you want it to apply to (right-click a folder, for example, choose properties.
Under the Security tab, click Advanced, then the Auditing tab.  Now you can determine which accounts you want to audit from here, Everyone for example, click OK and you will be presented with a list of items, success or fail, that you want to audit...
These will of course, be displayed in your security logs (Start->Run->Eventvwr)
0
 
LVL 3

Accepted Solution

by:
saito1 earned 500 total points
ID: 11702461
after changing anything in policy run the commands
secedit /refreshpolicy machine_policy /enforce
secedit /refreshpolicy user_policy /enforce
because if may take 90 minutes to effect. in event viewer go to scurity tab to see audit logs.

related articles:

http://support.microsoft.com/default.aspx?scid=kb;en-us;315416&Product=win2000#3

http://support.microsoft.com/default.aspx?scid=kb;en-us;300549&Product=win2000
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Corrupted W2K  serverregistry 2 157
no logon server available 8 158
Change port for terminal servers (2000 and 2003) 3 166
Repair old Windows 2000 boot 15 233
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question