Solved

Auditing domain admin's actions on exchange/OWA  settings

Posted on 2006-06-27
4
252 Views
Last Modified: 2013-12-04
I have a domain admin that I suspect is chaning things on exchange and OWA (on the same server).  Long story short.  I fixed the issue with only having to enter in username and password only in OWA instead of domain\username.  This worked fine for quite a while until I brought up this fix in a meeting. The admin in question said it wouldn't stay fixed and wanted to implement forms based authentication. (we're not ready to go that way yet, eventually we will). Not more than an hour later, it "mysteriously" reverted back to domain\username in OWA.  

How would I go about auditing any changes made to the network, exchange, and any other servers, when the admin is logged on? I really need some help on this and fast.

thanks
0
Comment
Question by:cknoderer
  • 3
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
Comment Utility
You should turn off the event logging levels, you can access them with secpol.msc or use AD to apply the logging level changes.
http://technet2.microsoft.com/WindowsServer/en/Library/5a86ab0f-c7eb-45ed-9e5e-514173bf15e31033.mspx
You can goto start>run... and type secpol.msc on the run line, then when that window opens goto Local Policies > Audit policy, and start changing the logging of sucess's or failures.
You can employ tools that can alert you to certain events that occur, there are free and paid tools for this.
Free: Snare http://www.intersectalliance.com/projects/SnareWindows/
Pay: GFI SELM http://gfi.com/lanselm/
Those tools will also serve as a backup of the log's, should someone erase them or modify them.
There are others, these two I like very much.
-rich
0
 
LVL 38

Expert Comment

by:Rich Rumble
Comment Utility
Geez... what a typo... I meant to say, you should turn UP event logging, not off...
-rich
0
 
LVL 1

Author Comment

by:cknoderer
Comment Utility
Thanks. I will try out the snare program.  I want to nail this weasel to the wall.
0
 
LVL 38

Expert Comment

by:Rich Rumble
Comment Utility
M$ doesn't keep track of IP's but does use machine names. You may consider using the firewall in 2003 to log ip's, or getting a firewall like zonealarm pro that can also log access via ip.
-rich
0

Featured Post

Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Secure removal of files encrypted by windows EFS 20 94
Clickfree HD 7 83
File audit / tracking software 3 74
should I worry about this? 6 87
Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now