Auditing Permissions - Server 2003

I have a problem with one server on a domain of 11 Windows 2003 servers.  Since this was migrated from a smaller HP box to the current 'box users have experienced very slow access to files, access denied faults requiring permissions to be reset, folders disappearing, system freezing for > 60sec on attempting to reset permissions.  Random users are affected by all these faults.

I've found a question posted back in 2004 ( See Q_21233866 ) with someone having a similar problem and I've also referred to this issue in my open question ( Q_24382549 ) which is about wiping and resetting the folder share permissions and the NTFS security.

Having reviewed various TechNet pages, I am unclear if turning on NTFS auditing will affect existing permissions.  Please can someone clarify:
1. the steps required to enable NTFS auditing so that I can track which accounts (if any) are triggering these changes to permissions, deleting folders etc.
2. Which actions should be audited for success / failure
3. Confirm that setting the auditing does not change any of the existing granted user share permissions or NTFS security.

Server is Dell PowerEdge 2950, dual quad core cpu, 16GB ram, 2 x 146GB mirrored SAS for system partitiion, 4 x 1 TB Sata Raid 5 data partition, dual teamed 1GB NICs, Windows Server 2003 SP2
LVL 1
cmdownAsked:
Who is Participating?
 
bluntTonyConnect With a Mentor Commented:
Hi, in answer to your questions:

1. You need to configure auditing using either local or group policy on the server. The policy is:

COmputer Configuration | Windows Settings | Security Settings | Local Policies | Audit Policy | 'Audit Object Access'

Set it to Success and Failure. If you've set via a GPO, then force a refresh (gpupdate /force). Then using explorer, go to the file/folder you want to audit, Security Tab | Advanced | Auditing. Add the 'Everyone' group and set the events you want to audit, e.g. 'Change permissions - Success'.

Now when a permission is changed, this should be logged in the Security Event log.

2. See 1. :0)

3. No, auditing will not change the permissions of the file/folder.
0
 
DTAHARLEVCommented:
auditing won't change anything.
0
 
cmdownAuthor Commented:
Hi Tony
Thankyou for your reply.  This server is not a DC and I can't find the local policy snapin.  How & where can I set a policy that applies only to this server and not all the others in the domain ?
0
NEW Internet Security Report Now Available!

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out this quarters report on the threats that shook the industry in Q4 2017.

 
cmdownAuthor Commented:
found it !
0
 
bluntTonyCommented:
You can get the local policy snap-in by typing gpedit.msc in the Run box.

Either that, or create a group policy, apply it to the OU holding the server, but then use security filtering (Scope tab in the GPMC) to only allow that one server to apply the policy (see the screenshot below of the GPMC). Remove 'Authenticated Users' and add just the computer account for the server (you'll have to tick 'Computer' in Object Types when selecting the computer account.

Probably simpler to apply locally if you can though! Bear in mind that local policy will be overruled by any conflicting group policies applied to the server.
Snap2.jpg
0
 
cmdownAuthor Commented:
Thanks Tony.  Have saved and cleared existing log.  Expanded max log size to 128Mb (!) (1,400 users !!) and set logging for change permissions as well as delete files and folders for the drive.  
0
 
bluntTonyCommented:
Wise move! It always pay to be careful when applying auditing to ensure that your log files don't get jammed with events.

Glad you got it sorted (or at least on the way to getting it sorted!)
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.