Solved

Access control logs

Posted on 2006-10-26
3
187 Views
Last Modified: 2010-04-11
How to enable the logging to monitor access controls for a folder in Microsoft Server 2003?
0
Comment
Question by:chia_simon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Accepted Solution

by:
mahe2000 earned 500 total points
ID: 17817690
i think you want to know if somebody access your folder... you have to do this:

1 - set Audit Object Access to success (or success and failure if you want) - Administrative tools\Local Security Policy\Local Policies\Audit Policy
2 - set auditory on the folder - folder properties\security\advanced\auditing -> add everyone with the type of access you want for success and failure

then you can see this in the security log of the event viewer.
0

Featured Post

Business Impact of IT Communications

What are the business impacts of how well businesses communicate during an IT incident? Targeting, speed, and transparency all matter. Find out more in this infographic.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Blackberry and SMS logging 5 35
What is the goal of SOC2 compliance? 4 50
encrypt SQL Server 2008 port 1433 3 47
VPN Exposure 19 35
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question