Solved

AD Auditing Logs

Posted on 2013-01-21
2
251 Views
Last Modified: 2013-01-26
Dear All,

What are the recommendations to enable and configure windows 2008 R2 Active Directory Auditing Logs?

Thanks
0
Comment
Question by:Rhala
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Expert Comment

by:AliQahtani
ID: 38800652
Hi Rhala,

can you please check the link from EE
http://www.experts-exchange.com/Security/Misc/Q_27596995.html
0
 
LVL 3

Accepted Solution

by:
jeorge earned 500 total points
ID: 38800720
Since at Active Directory there are many of the events in built which are needed to be revised on a daily basis. If the auditing is enabling then only it will appear. Like security logs if its not enable then you wont be able to get the user and its security information.

For instance like if we create a user and then after few days time we delete the user, then its the ad auditor who lets us know what we did and created.

Moreover there are many of the events which we need to calculate. Then at that moment its compulsory to enable the auditing logs.

The link recommended by ali is recommendable and moreover you can refer this link also.

http://www.windowsecurity.com/articles/Auditing-Users-Groups-Windows-Security-Log.html

http://goo.gl/caFvf

I hope it helps you out.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Background Information Recently I have fixed file server permission issues for one of my client. The client has 1800 users and one Windows Server 2008 R2 domain joined file server with 12 TB of data, 250+ shared folders and the folder structure i…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question