Solved

Windows 2003 Audit polidy success/failure audits - so many logs! need to cut down.

Posted on 2009-05-02
5
475 Views
Last Modified: 2012-05-06
I have enabled audit logs on a folder, and tested it out.

I added "domain users" as the group to audit thinking that this would include everyone in the domain.

Well when I open the folder being audited it creates 8 logs in the security folder. This just seems like a ton of logs for me for a simple action such as "open" a folder. What do you guys think? Is there a better way to do this, or is this a normal thing?

Thank you.
0
Comment
Question by:jaesoul
5 Comments
 
LVL 17

Expert Comment

by:Nik
ID: 24288745
I had the same need in the past and couldn't google for anything than for some third party tools like:
http://www.quest.com/spotlight-on-active-directory-pack/
http://www.manageengine.com/products/ad-manager/windows-active-directory-reports.html


0
 
LVL 5

Accepted Solution

by:
karstieman earned 500 total points
ID: 24288805
User the FILTER option in the Eventviewer option to find what you were looking for.
Otherwise, specify the audit more specifically and for instace audit only FAILED object access to this folder.
0
 

Author Comment

by:jaesoul
ID: 24290548
Hey Guys,

I am going to give these options a shot and get right back.Thank you.
0
 
LVL 6

Expert Comment

by:astralcomputing
ID: 24848463
Ok here is a really easy solution I like to use. In the logon script add the following line

echo %date%, %time%, %computername%, %username%, Sign on >> \\server\networkshare\login.log

This keeps a running tally of all logins, in a CSV format which can be imported into excel and sort, searched, etc...

You have the date, time, computer and username.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question