Solved

Auditing Security Events

Posted on 2009-04-02
2
296 Views
Last Modified: 2012-05-06
I want to set auditing on only one Shared folder on a server that holds home folders for users and a shared department data folder. I want to capture folder moves, creations, deletions and security changes to the folders using the built in auditing features of Windows 2003. I know that this can potentially make my security event logs get very big.

Does anyone have suggestions or recommendation on how to do this?
0
Comment
Question by:Y2KBDS
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 500 total points
ID: 24050671
First you need to go to the Local Security Policy and go to the Audit Policy and enable the auditiong of Object Access (as you only want to record whrn something has happend just select "success"

Then on the folder go to Security->Advanced and select the auditing tab. Add the group(s) you want to monitor (or use Everyone), and then specify the events to be logged.
0
 
LVL 2

Expert Comment

by:netskyb0
ID: 24050690
Standard procedure:

Open GP Management on your server and in computer security policy you have to enable "object auditing" then right click the folder you interested in auditing and go to properties, then click "security", advanced and "auditing" then create policy for auditing for users, actions and so on.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question