Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Windows 2008 Folder access

Posted on 2013-01-11
2
Medium Priority
?
367 Views
Last Modified: 2013-01-28
Hi All,

I need to find out who is copy a file to the network (actually they are replacing an existing file).

So I enabled auditing for the server using this guide and enable object access on the folder.


This works for the folder.  But it's logging all folders.  How do I restrict it to just the folder I want to monitor?
0
Comment
Question by:detox1978
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 17

Accepted Solution

by:
Tony Massa earned 1500 total points
ID: 38767932
Disable auditing on the (parent) folder you're currently monitoring, or you can't change the auditing to the sub-folder since it will inherit the settings of the parent.

You should only audit the folder/files you're interested in.
http://technet.microsoft.com/en-us/library/cc771070(v=ws.10).aspx
0
 
LVL 2

Author Closing Comment

by:detox1978
ID: 38829035
Thanks
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to deal with a specific error when using the Enable-RemoteMailbox cmdlet to create a mailbox in the cloud-based service, for an existing user in an on-premises Active Directory.
A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question