?
Solved

How do I enable auditing of who moved or deleted a folder from my file server.

Posted on 2010-09-17
4
Medium Priority
?
564 Views
Last Modified: 2013-11-14
How do I enable auditing of who moved or deleted a folder from my file server. I'm running  a simple domain with a file server. Thanks.
0
Comment
Question by:jguerra68
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 6

Expert Comment

by:collins23
ID: 33701801
tripwire
0
 
LVL 57

Accepted Solution

by:
Mike Kline earned 1000 total points
ID: 33701809
You have to setup auditing on the server and then on the file/folder.  See this question I helped with earlier this year
http://www.experts-exchange.com/Software/Server_Software/File_Servers/Active_Directory/Q_25871198.html
Thanks
Mike
0
 
LVL 6

Expert Comment

by:collins23
ID: 33701825
0
 

Author Closing Comment

by:jguerra68
ID: 34011250
had to move on
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question