Solved

AD Auditing Logs

Posted on 2013-01-21
2
250 Views
Last Modified: 2013-01-26
Dear All,

What are the recommendations to enable and configure windows 2008 R2 Active Directory Auditing Logs?

Thanks
0
Comment
Question by:Rhala
2 Comments
 
LVL 3

Expert Comment

by:AliQahtani
ID: 38800652
Hi Rhala,

can you please check the link from EE
http://www.experts-exchange.com/Security/Misc/Q_27596995.html
0
 
LVL 3

Accepted Solution

by:
jeorge earned 500 total points
ID: 38800720
Since at Active Directory there are many of the events in built which are needed to be revised on a daily basis. If the auditing is enabling then only it will appear. Like security logs if its not enable then you wont be able to get the user and its security information.

For instance like if we create a user and then after few days time we delete the user, then its the ad auditor who lets us know what we did and created.

Moreover there are many of the events which we need to calculate. Then at that moment its compulsory to enable the auditing logs.

The link recommended by ali is recommendable and moreover you can refer this link also.

http://www.windowsecurity.com/articles/Auditing-Users-Groups-Windows-Security-Log.html

http://goo.gl/caFvf

I hope it helps you out.
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question