Solved

Auditing

Posted on 2006-11-01
8
401 Views
Last Modified: 2010-04-11
Hi

If you have a file server which has a folder with confidentail info, that only one group should be allowed to access

How would you maintain records of all attempts to access the folder.

I've been told you Enable Auditing of object access events on the server AND then on the folder it self you audit the Everyone group

My questions is this......I understand why you have to monitor the everyone group on the folder in question. but why do you have to enable auditing of object access events on the server. Cant you just do that on the folder itself?


0
Comment
Question by:LFC1980
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
8 Comments
 

Expert Comment

by:winsoc
ID: 17850200
Could you specify what OS for which you require Auditing.
For tracking file access you should really be looking at "Tripwire"
0
 

Author Comment

by:LFC1980
ID: 17851078
It's something out of an MCSE study book, not something i am carrying out in real life.

The file server is a 2003
0
 
LVL 3

Expert Comment

by:mahe2000
ID: 17855291
you have to do both.... the audit policy to tell the server that he has to audit objects and the audit configuration in the folder to tell him what he has to audit.
0
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

 

Author Comment

by:LFC1980
ID: 17856575
But why couldn't we just put the audit policy that has been put on the server on the folder instead, as thats what we want to monitor?
0
 
LVL 3

Expert Comment

by:mahe2000
ID: 17858224
because the server audit policy is for "turning on" auditing.... then you have to configure what you want to audit. ask bill why they did it this way.... :)
0
 

Author Comment

by:LFC1980
ID: 17865544
So would this always be the case with auditing (i.e. always "turn it on" on the server first)
0
 

Author Comment

by:LFC1980
ID: 17907271
?
0
 
LVL 3

Accepted Solution

by:
mahe2000 earned 125 total points
ID: 17913908
yes, that's the way to do it. first turning on auditing on objects and then tell him what to audit.
0

Featured Post

Webinar June 1st - Attacking Ransomware  

The global cyberattack that corrupted hundreds of thousands of computer systems on May 12th had a face, name, & price tag that we’ve seen all too often in recent years: Ransomware. With the stakes – and costs – of a ransomware attack higher than ever, is your business prepared ?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Eset Smart Securties ARP poisoning attack 3 90
Evaluating Enterprise Antivirus solutions 2 77
remote desktop user rights 5 97
Carbon Black hardware/system requirements 3 54
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question