Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to increase size of security file size on all Windows 2003 servers?

Posted on 2011-03-25
3
Medium Priority
?
554 Views
Last Modified: 2012-06-27
Hello all, after enabling SUCCESSFUL & FAILURE audit events in my log on Windows 2003 terminal server, Windows 2003 domain controller, I realize that the log size will now increase exponentially. How do I increase maximum log size or at least manage the size?
0
Comment
Question by:XAnalyzer
3 Comments
 
LVL 5

Expert Comment

by:TomasP
ID: 35219225
http://technet.microsoft.com/en-us/library/cc179815.aspx

This will help you with your issue. You can increase the size and allow overwrite as needed on aged events
0
 
LVL 42

Expert Comment

by:kevinhsieh
ID: 35219469
You should set it as a group policy. Local Computer, Policies, Windows Settings, Security Settings, Event Log. Set the Maximum security log size and Retention method. I set this for all logs and apply to to the entire domain.
0
 
LVL 3

Accepted Solution

by:
GlobalStrata earned 2000 total points
ID: 35219886
What OS are you using?  If 2003 32bit, all the logs put together cannot be bigger than 300 MB because these are memory mapped files and only 300MB of RAM is allocated for logs.
http://support.microsoft.com/kb/183097

If you use GPO to set it up, you may run into issues so be aware of the following:
http://support.microsoft.com/kb/824245 

If you want to go as higher as your disk, go Windows 2008 R2.

There is a GPO that you can set in the servers that allows for the event logs to be automatically dumped to a file when the log is full .  Then you can set a scheduled task that moves the backup files to another location so the servers disk do not get full. (Archive the log when full)
http://technet.microsoft.com/en-us/library/cc721981.aspx
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question