Solved

Best FREE auditing method for Windows 2008 R2?

Posted on 2014-09-14
2
175 Views
Last Modified: 2014-10-26
Hi,

We need to audit user based activity including RDP connections and programs ran.
What is the best free method to enable such auditing - which will be readable in the end (not just a bunch of endless logs)?

Thanks
0
Comment
Question by:IT_Group1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 34

Assisted Solution

by:Michael-Best
Michael-Best earned 250 total points
ID: 40321877
To my knowledge there is not what you request.
This link should help:
http://technet.microsoft.com/en-us/library/dd349800(v=ws.10).aspx
0
 
LVL 81

Accepted Solution

by:
David Johnson, CD, MVP earned 250 total points
ID: 40321984
splunk is one of the best
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question