Solved

file audit question

Posted on 2006-11-27
3
210 Views
Last Modified: 2010-04-18
My goal is to have a failed security log to post in the event viewer when someone tries to access a folder or file they do not have access to.  I enabled 'failed' file audits for the 'everyone' group.  I set the option 'List/Folder Read Data'.  Shouldn't this simply place an entry in my security log when someone is denied access to a folder or file?  I'm getting all kind of failed security logs when people are successfully accessing files.  Why is it logging successful attempts to files and folders?

thanks
0
Comment
Question by:gopher_49
  • 2
3 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 250 total points
ID: 18023496
you need to enable auditing in GPO as well as on individual folders that you want to audit...
0
 

Author Comment

by:gopher_49
ID: 18071720
When you say 'enable auditing in GPO', do you mean 'policy auditing'???
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 18088686
i mean enable auditing (object access, account access etc) in group policy
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Preface Having the need * to contact many different companies with different infrastructures * do remote maintenance in their network required us to implement a more flexible routing solution. As RAS, PPTP, L2TP and VPN Client connections are no…
Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question