Solved

SharePoint Audit log report

Posted on 2011-09-14
3
566 Views
Last Modified: 2012-08-13
Hello,

Recently, deletionsof people and groups were made in our sharepoint 2007 intranet site by someone.  I checked the SharePoint Audit Log and I saw some deletes but the report is incomplete.  I know because, I as a site collection administrator was one of the people that lost permissions and I did not see my permissions as deleted by anyone.

Is there a way through some other logs to find out how I was deleted and by who?

Thanks for any help you can provide.
0
Comment
Question by:Isaac
3 Comments
 
LVL 10

Assisted Solution

by:ImaCircularSaw
ImaCircularSaw earned 200 total points
Comment Utility
Have you got auditing turned on for the site/site collection you need the information for?  See following url for how to check if this is enabled:

     http://nickgrattan.wordpress.com/2007/11/27/auditing-permission-changes/
0
 
LVL 5

Author Comment

by:Isaac
Comment Utility
Auditing is turned on but the information it provides is not complete.
So, I was wondering if there is some other way/log to check  if someone's permissions were changed or deleted.

Thanks!
0
 
LVL 14

Accepted Solution

by:
binaryevo earned 300 total points
Comment Utility
Not sure if this helps or not but, this article gives you info on which logs and where they are.

http://community.bamboosolutions.com/blogs/bambooteamblog/archive/2008/09/29/how-do-i-troubleshoot-sharepoint-so-many-logs.aspx
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

Today I had a very interesting conundrum that had to get solved quickly. Needless to say, it wasn't resolved quickly because when we needed it we were very rushed, but as soon as the conference call was over and I took a step back I saw the correct …
In this article I will describe the Detach & Attach method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now