Solved

Configuring Audit Policy without AD

Posted on 2010-08-31
5
319 Views
Last Modified: 2013-12-07
I want to configure Audit Policy on a server that is only a file server ( no AD ). How can i do it? is it possibe?

OS: Windows Server 2003 R2
0
Comment
Question by:ragot
  • 2
  • 2
5 Comments
 
LVL 4

Expert Comment

by:goyal_251
Comment Utility
0
 

Author Comment

by:ragot
Comment Utility
i cannot see " domain controller policy " under administrative tools
0
 

Author Comment

by:ragot
Comment Utility
is it the same as i go gpedit.msc?
0
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 500 total points
Comment Utility
Do you have GPMC installed? If not, download it from Microsoft and install on your workstation.

http://www.microsoft.com/downloads/details.aspx?FamilyID=0a6d4c24-8cbd-4b35-9272-dd3cbfc81887&displaylang=en

Now open it from Administrative Tools or type in run box in start menu gpmc.msc

Then expand node Forest -> Domains -> your domain  and look for node "Group Policy Objects" (expand it also). There you will find Default Domain Controller Policy. You can edit it by clicking right mouse button.

Other way if you don't want to install GPMC. Run Active Directory Domain Users and Computers (ADUC) console or type in ryn box in start menu dsa.msc (to run this console you have to do it on server or workstation with Administrative Tools installed).
Find your "Domain Controllers" OU and click on it right mouse button and choose "Properties". You will have there "Group Policy" tab, pick it up and click "Open" button. A window with policies linked to that OU will appear. Select "Default Domain Controller" policy and click "Edit" button.

Now you can set everything you want to audit from previous post of goyal_251
0
 
LVL 4

Expert Comment

by:goyal_251
Comment Utility
ohh. its in local security policy under under administrative tools
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Numerous times I have been asked this questions that what is it that makes my machine log on so slow, there have been cases where computers took 23 minute exactly after taking password and getting to the desktop. Interesting thing was the fact th…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now