Solved

What rights should I grand a regular user to read DC System Logs

Posted on 2015-01-12
3
84 Views
Last Modified: 2015-01-17
Hello,
I have a regular user which i'm looking to give permissions to have the SIEM read the AD logs (2008 R2).
I don't want to make that user a Domain Admin so i need to know what (if any) permissions (and how) i need to assign to have him read the security log (as of right now simple read permissions as everyone else fail)
0
Comment
Question by:johnnyjonathan
3 Comments
 
LVL 4

Expert Comment

by:Manoj Bojewar
ID: 40544961
Normal user access will not work to login DC. you need to forward DC logs to other server and that server, you can allow user to access DC logs.

http://technet.microsoft.com/en-us/library/cc748890.aspx
0
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40544969
I guess you just need to populate the built-in group "eventlog readers"
0
 

Author Closing Comment

by:johnnyjonathan
ID: 40555074
Simple and perfect! thanks!
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Resolve DNS query failed errors for Exchange
This script can help you clean up your user profile database by comparing profiles to Active Directory users in a particular OU, and removing the profiles that don't match.
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question