Solved

File Monitoring Using GPO

Posted on 2014-10-15
2
74 Views
Last Modified: 2014-10-20
I'm looking for some guidance on a GPO policy that would monitor network folders/files for unauthorized access. We're in a server 2008 AD environment.
0
Comment
Question by:TSB14883
2 Comments
 
LVL 36

Accepted Solution

by:
Jian An Lim earned 500 total points
ID: 40383572
really depends on what you want to audit the below is the overview and details of gpo.

feel free to ask what you need because your question are too generic.

Overview: http://technet.microsoft.com/en-au/library/dd277403.aspx
Details: https://blogs.manageengine.com/product-blog/eventloganalyzer/2012/06/20/object-access-auditing-simplified-find-the-who-what-where-when-of-file-folder-access.html
0
 

Author Comment

by:TSB14883
ID: 40391773
I'm looking to audit when users attempt to access network folders that do not belong to them, etc.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you migrate a Terminal Server licenses server inside the 2008 server family, you can takte advantage of the build-in migration tool. If you like to migrate an older 2003 Server (and the installed client CALs) to a 2008 R2 server for example, you …
You might have come across a situation when you have Exchange 2013 server in two different sites (Production and DR). After adding the Database copy in ECP console it displays Database copy status unknown for the DR exchange server. Issue is strange…
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question