Solved

logging and monitoring policy

Posted on 2011-09-29
3
408 Views
Last Modified: 2013-12-07
Does anyone have a corporate logging and monitoring policy for your IT Network? And if so what kinds of things does it cover, or is it the usual email/internet activity and nothing more? If it goes further what other areas are covered?
0
Comment
Question by:pma111
  • 2
3 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 36815224
Common to audit group policy changes, we audit adding and removal members to some of the built in groups like domain admins.

one thing about the built in auditing is that getting audit reports and alerts is not the greatest strength of AD natively.  There are third party tools that can really help in this space.  One example from quest.   http://www.quest.com/changeauditor-for-active-directory/

Thanks

Mike
0
 
LVL 3

Author Comment

by:pma111
ID: 36815250
Do you maintain audits of successful login/logouts into the domain?
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 36815335
Not where I am now, at my last job we used a login script like this    http://msmvps.com/blogs/kwsupport/archive/2005/02/24/36942.aspx

Thanks

Mike
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question