?
Solved

Auditing Security Events

Posted on 2009-04-02
2
Medium Priority
?
300 Views
Last Modified: 2012-05-06
I want to set auditing on only one Shared folder on a server that holds home folders for users and a shared department data folder. I want to capture folder moves, creations, deletions and security changes to the folders using the built in auditing features of Windows 2003. I know that this can potentially make my security event logs get very big.

Does anyone have suggestions or recommendation on how to do this?
0
Comment
Question by:Y2KBDS
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 1500 total points
ID: 24050671
First you need to go to the Local Security Policy and go to the Audit Policy and enable the auditiong of Object Access (as you only want to record whrn something has happend just select "success"

Then on the folder go to Security->Advanced and select the auditing tab. Add the group(s) you want to monitor (or use Everyone), and then specify the events to be logged.
0
 
LVL 2

Expert Comment

by:netskyb0
ID: 24050690
Standard procedure:

Open GP Management on your server and in computer security policy you have to enable "object auditing" then right click the folder you interested in auditing and go to properties, then click "security", advanced and "auditing" then create policy for auditing for users, actions and so on.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question