Solved

file audit question

Posted on 2006-11-27
3
227 Views
Last Modified: 2010-04-18
My goal is to have a failed security log to post in the event viewer when someone tries to access a folder or file they do not have access to.  I enabled 'failed' file audits for the 'everyone' group.  I set the option 'List/Folder Read Data'.  Shouldn't this simply place an entry in my security log when someone is denied access to a folder or file?  I'm getting all kind of failed security logs when people are successfully accessing files.  Why is it logging successful attempts to files and folders?

thanks
0
Comment
Question by:gopher_49
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 250 total points
ID: 18023496
you need to enable auditing in GPO as well as on individual folders that you want to audit...
0
 

Author Comment

by:gopher_49
ID: 18071720
When you say 'enable auditing in GPO', do you mean 'policy auditing'???
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 18088686
i mean enable auditing (object access, account access etc) in group policy
0

Featured Post

Revamp Your Training Process

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, I had the need to build a standalone system to run a point-of-sale system. I’m running this on a low-voltage Atom processor, so I wanted a light-weight operating system, but still needed Windows. I chose to use Microsoft Windows Server 200…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question