Improve company productivity with a Business Account.Sign Up

x
?
Solved

Windows 2003 Audit polidy success/failure audits - so many logs! need to cut down.

Posted on 2009-05-02
5
Medium Priority
?
497 Views
Last Modified: 2012-05-06
I have enabled audit logs on a folder, and tested it out.

I added "domain users" as the group to audit thinking that this would include everyone in the domain.

Well when I open the folder being audited it creates 8 logs in the security folder. This just seems like a ton of logs for me for a simple action such as "open" a folder. What do you guys think? Is there a better way to do this, or is this a normal thing?

Thank you.
0
Comment
Question by:jaesoul
4 Comments
 
LVL 17

Expert Comment

by:Nik
ID: 24288745
I had the same need in the past and couldn't google for anything than for some third party tools like:
http://www.quest.com/spotlight-on-active-directory-pack/
http://www.manageengine.com/products/ad-manager/windows-active-directory-reports.html


0
 
LVL 5

Accepted Solution

by:
karstieman earned 1500 total points
ID: 24288805
User the FILTER option in the Eventviewer option to find what you were looking for.
Otherwise, specify the audit more specifically and for instace audit only FAILED object access to this folder.
0
 

Author Comment

by:jaesoul
ID: 24290548
Hey Guys,

I am going to give these options a shot and get right back.Thank you.
0
 
LVL 6

Expert Comment

by:astralcomputing
ID: 24848463
Ok here is a really easy solution I like to use. In the logon script add the following line

echo %date%, %time%, %computername%, %username%, Sign on >> \\server\networkshare\login.log

This keeps a running tally of all logins, in a CSV format which can be imported into excel and sort, searched, etc...

You have the date, time, computer and username.
0

Featured Post

Upgrade your Question Security!

Your question, your audience. Choose who sees your identity—and your question—with question security.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thin…
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question