Folder Level/User Auditing

We had someone or something come in and delete a bunch of our production data last night. I am recovering it, but I wanted to see how to set up a folder level audit so that it records in the Event Viewer.

This is what I am doing:

Log into "Server"

1. Turn the auditing system on. Click Start  > Run > gpedit.msc {enter} NB We are in LOCAL policies here DONT define auditing in Domain policy as all your clients event viewers will fill up with junk, and it slows them down.

2. Navigate to "Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\"

3. Double click "Audit Object Access" > Tick Success and Failure > apply > OK

4. Exit the Group policy Editor

5. Navigate to the "share" Folder > right click > properties > security > advanced > auditing

6. DONT click ADD, double click in the "white-space" in the middle of the auditing window.

7. By default the "Everyone" Group is selected, leave it this way unless there is a specific group you want to audit.

8. Select the "actions" you want to audit > OK >OK >OK

Audited Events will now be displayed in the event viewer > security log

I set the folder with the Audit Policy, but for some reason in the Event Viewer all I am getting is "Object Access" category entries. I am looking for more specific things like.

User A deleted this file/folder on whatever date.....   Is this even possible?
Who is Participating?
Toni UranjekConnect With a Mentor Consultant/TrainerCommented:
You can use filtering, right click Security log and selectView, Filter... or you can export events in csv format and examine them with Excel.
Toni UranjekConsultant/TrainerCommented:

You have to examine the contents of record. When user deletes an object an event with ID 564 should be recorded.

surftechAuthor Commented:
Right but what I am looking for is who deleted an object.
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

Toni UranjekConsultant/TrainerCommented:
If event 564 does not contain username, open nearest 560 event which should contain username.
surftechAuthor Commented:
Here is my scenario.

I have about 10 servers. On each server of those 10 is a root folder in which users place and process data. I want to be able to view events based off of those root folder in the security tab of each server in which entries will log who created a folder and who deleted a folder, with the user name.

Right now I can only get 3 of the Categories. Object Access, Logon/Logoff, Policy change. I need the Delete or Create category to display with the username who deleted it...

A screen shot is attached.

surftechAuthor Commented:
And you can see that the 1 entry has the user name "lauro" that is my username. I would like that for all my users for Create and Delete entries. But I cant seem to accomplish that...
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.