Solved

file audit question

Posted on 2006-11-27
3
203 Views
Last Modified: 2010-04-18
My goal is to have a failed security log to post in the event viewer when someone tries to access a folder or file they do not have access to.  I enabled 'failed' file audits for the 'everyone' group.  I set the option 'List/Folder Read Data'.  Shouldn't this simply place an entry in my security log when someone is denied access to a folder or file?  I'm getting all kind of failed security logs when people are successfully accessing files.  Why is it logging successful attempts to files and folders?

thanks
0
Comment
Question by:gopher_49
  • 2
3 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 250 total points
ID: 18023496
you need to enable auditing in GPO as well as on individual folders that you want to audit...
0
 

Author Comment

by:gopher_49
ID: 18071720
When you say 'enable auditing in GPO', do you mean 'policy auditing'???
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 18088686
i mean enable auditing (object access, account access etc) in group policy
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

I guess it is not common knowledge to most Wintel engineers/administrators: If you have an SNMP-based monitoring system in your environment (and it's common to have SNMP or Syslog) it's reasonably easy to enable monitoring of the Windows Event logs,…
On July 14th 2015, Windows Server 2003 will become End of Support, leaving hundreds of thousands of servers around the world that still run this 12 year old operating system vulnerable and potentially out of compliance in many organisations around t…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now