?
Solved

Audit Settings

Posted on 2008-10-08
1
Medium Priority
?
161 Views
Last Modified: 2012-05-05
Are there any tools or techniques in active directory that show exactly which user and when accessed a file on a file server in an AD environment. I know you get the MAC data but that is not really what we are after as that would only have last accessed, we need a complete log of when and how. Or do auditing features need to have been turned on for there to be any log of when and who accessed the file?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 70

Accepted Solution

by:
KCTS earned 1000 total points
ID: 22667955
IF auditing is swiched on then these events are recorded in the security log
This is for Win2000 - but Win2003 is identical http://support.microsoft.com/kb/300549
also see http://support.microsoft.com/kb/310399 (also applies to 2000/2003)
and
http://www.lockergnome.com/nexus/it/2006/10/10/windows-server-2003-auditing-part-i/
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month14 days, 10 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question