Solved

Audit Settings

Posted on 2008-10-08
1
160 Views
Last Modified: 2012-05-05
Are there any tools or techniques in active directory that show exactly which user and when accessed a file on a file server in an AD environment. I know you get the MAC data but that is not really what we are after as that would only have last accessed, we need a complete log of when and how. Or do auditing features need to have been turned on for there to be any log of when and who accessed the file?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 70

Accepted Solution

by:
KCTS earned 250 total points
ID: 22667955
IF auditing is swiched on then these events are recorded in the security log
This is for Win2000 - but Win2003 is identical http://support.microsoft.com/kb/300549
also see http://support.microsoft.com/kb/310399 (also applies to 2000/2003)
and
http://www.lockergnome.com/nexus/it/2006/10/10/windows-server-2003-auditing-part-i/
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question