Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Auditing domain admin's actions on exchange/OWA  settings

Posted on 2006-06-27
4
Medium Priority
?
261 Views
Last Modified: 2013-12-04
I have a domain admin that I suspect is chaning things on exchange and OWA (on the same server).  Long story short.  I fixed the issue with only having to enter in username and password only in OWA instead of domain\username.  This worked fine for quite a while until I brought up this fix in a meeting. The admin in question said it wouldn't stay fixed and wanted to implement forms based authentication. (we're not ready to go that way yet, eventually we will). Not more than an hour later, it "mysteriously" reverted back to domain\username in OWA.  

How would I go about auditing any changes made to the network, exchange, and any other servers, when the admin is logged on? I really need some help on this and fast.

thanks
0
Comment
Question by:cknoderer
  • 3
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 2000 total points
ID: 16996040
You should turn off the event logging levels, you can access them with secpol.msc or use AD to apply the logging level changes.
http://technet2.microsoft.com/WindowsServer/en/Library/5a86ab0f-c7eb-45ed-9e5e-514173bf15e31033.mspx
You can goto start>run... and type secpol.msc on the run line, then when that window opens goto Local Policies > Audit policy, and start changing the logging of sucess's or failures.
You can employ tools that can alert you to certain events that occur, there are free and paid tools for this.
Free: Snare http://www.intersectalliance.com/projects/SnareWindows/
Pay: GFI SELM http://gfi.com/lanselm/
Those tools will also serve as a backup of the log's, should someone erase them or modify them.
There are others, these two I like very much.
-rich
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 16996064
Geez... what a typo... I meant to say, you should turn UP event logging, not off...
-rich
0
 
LVL 1

Author Comment

by:cknoderer
ID: 17009748
Thanks. I will try out the snare program.  I want to nail this weasel to the wall.
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17009782
M$ doesn't keep track of IP's but does use machine names. You may consider using the firewall in 2003 to log ip's, or getting a firewall like zonealarm pro that can also log access via ip.
-rich
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
The Relationships Diagram is a good way to get an overall view of what a database is keeping track of. It is also where relationships are defined. A relationship specifies how two tables connect to each other. As you build tables in Microsoft Ac…

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question