?
Solved

Access control logs

Posted on 2006-10-26
3
Medium Priority
?
195 Views
Last Modified: 2010-04-11
How to enable the logging to monitor access controls for a folder in Microsoft Server 2003?
0
Comment
Question by:chia_simon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Accepted Solution

by:
mahe2000 earned 2000 total points
ID: 17817690
i think you want to know if somebody access your folder... you have to do this:

1 - set Audit Object Access to success (or success and failure if you want) - Administrative tools\Local Security Policy\Local Policies\Audit Policy
2 - set auditory on the folder - folder properties\security\advanced\auditing -> add everyone with the type of access you want for success and failure

then you can see this in the security log of the event viewer.
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the rising number of cyber attacks in recent years, keeping your personal data safe has become more important than ever. The tips outlined in this article will help you keep your identitfy safe.
If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question