Solved

Service connection point Object creation/deletion is not audited in Active Directoty

Posted on 2014-03-31
5
97 Views
Last Modified: 2015-06-24
Hi,
I am trying to audit creation/deletion/update of service connection point type objects in an specific OU and sub OU's in AD. Attached is the snapshot of audit policy I have applied on OU. But I do not see any events in security events log on the DC. Can any one tell me what I am doing wrong or what else needs to be done to enable audit on all object in certain OU in AD?
Policy.JPG
0
Comment
Question by:SRao123
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 37

Accepted Solution

by:
Mahesh earned 500 total points
ID: 39966030
What your screen shot showing is you have enabled auditing of file folder access

If you wanted to audit SCP related changes, then you must enable Audit directory service access for failure and success in default domain controller policy, then it will populate logs in security event logs on DC server

Also you will get some information in Directory service event logs on domain controller

Mahesh.
0
 
LVL 1

Author Comment

by:SRao123
ID: 39966043
We have DS auditing on success enabled, as in attached snapshot. Will that be enough or we need to make some other changes?
policy2.JPG
0
 
LVL 37

Expert Comment

by:Mahesh
ID: 39966194
That right
You need to select failure as well
0
 
LVL 35

Expert Comment

by:Seth Simmons
ID: 40848205
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question