programming4us
           
 
 
Windows Server

Windows Server 2003 : Auditing Events (part 1) - Audit Settings for Objects

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/14/2011 9:11:19 AM
Auditing certain computers, users, and operating system events is a necessary part of network administration. You choose what is to be audited and then, by reviewing the event logs, track usage patterns, security problems, and network traffic trends. Beware of the impulse to audit everything, however. The more events you audit, the bigger the logs. Reviewing huge event logs is a painful chore, and eventually no one looks at them anymore. These logs can take up enormous amounts of space. Therefore, it’s critical to decide on an auditing policy that protects your network without creating a large administrative burden. Also bear in mind that every audited event results in a small increase in performance overhead.

By default, all auditing categories are turned off when Windows Server 2003 SP1 or later is installed except for success audits of logon events. Table 1 lists the categories of events that can be audited.

Table 1. Auditing categories
Event CategoryActivated When
Account logon eventsA domain controller receives a logon request
Account managementA user account or group is created or changed
Directory service accessAn Active Directory object is accessed
Logon eventsA user logs on or logs off
Object accessAn object is accessed
Policy changeA policy affecting security, user rights, or auditing is modified
Privilege useA user right is used to perform an action
Process trackingAn application executes an action that is being tracked
System eventsA computer is rebooted or shut down or another event occurs that affects security

Every audited event tells you something, but it’s not always something you need to know. For example, auditing successful logons and logoffs might reveal the use of a stolen password, or it might just produce countless pages showing that your duly authorized users are logging on and off as expected. Auditing logon failures, however, will definitely be rewarding if someone is trying a random password hack.

Before you can audit access to Active Directory objects (which is described in the next section), you must turn on the Audit Policy setting by using Group Policy. To enable auditing of any of the categories in Table 1, open the Default Domain Policy MMC if you have one; otherwise, follow these steps to enable auditing for all computers in the domain:

1.
Launch Active Directory Users and Computers.

2.
Right-click the domain name in the console tree, and choose Properties from the shortcut menu.

3.
Click the Group Policy tab and then click Edit.

4.
In the console tree, click your way through Computer Configuration, Windows Settings, Security Settings, and Local Policies to reach Audit Policy, as shown in Figure 1.

Figure 1. Categories of events for auditing

5.
Right-click the event category you want to audit, and choose Properties from the shortcut menu.

6.
In the dialog box that opens, select the check box to define the setting and select the option to audit successful attempts, failed attempts, or both.

Audit Settings for Objects

Assuming that you’ve turned on a policy setting for auditing an Active Directory object, create audit settings for objects by following these steps:

1.
Right-click the object you want to audit, and choose Properties from the shortcut menu. Click the Security tab.

2.
Click Advanced, and then click the Auditing tab.

3.
Click Add to set up auditing for a new group or user. Make your selection and click OK.

4.
Select the events you want to audit, as shown in Figure 2. Table 2 lists the options and their definitions.

Figure 2. Selecting events to be audited


Table 2. File system events that can be audited
EventActivated When
Traverse Folder/Execute FileA folder is traversed (that is, someone passes through the folder on the way to a parent folder or a child folder) or an application is run.
List Folder/Read DataA folder is opened or data is viewed in files.
Read AttributesThe attributes of a file or folder are viewed.
Read Extended AttributesExtended attributes (defined and created by programs) of a file or folder are viewed.
Create Files/Write DataA file is created inside a folder or a file is changed, overwriting existing information in the file.
Create Folders/Append DataA folder is created inside the folder being audited or information is added to an existing file.
Write AttributesA file or folder attribute is changed.
Write Extended AttributesExtended attributes (defined and created by programs) of a file or folder are changed.
Delete Subfolders and FilesA file or subfolder is deleted.
DeleteA specific file is deleted.
Read PermissionsPermissions for a file or folder are viewed.
Change PermissionsPermissions for a file or folder are modified.
Take OwnershipOwnership of a file or folder changes.

5.
Click OK when finished.

Note

By default, audit settings are inherited by child objects. The Auditing tab of the Access Control Settings dialog box includes a check box for allowing inheritable auditing entries. Clear this check box and the audit settings for the object remain constant, even if the parent object’s audit settings are changed. In addition, clearing this check box removes any audit settings that have already been inherited. The second check box in this tab resets existing auditing and allows audit entries to be inherited from the parent object once again.


Auditing Advisory

Windows Server 2003 allows such granularity that it’s possible—actually easy—to create a real morass when selecting audit settings. So many items can show up in the event log that really important issues might be lost in the crowd. Be very careful when deciding what events need to be audited, and audit as few as is reasonable. You can always add events later as circumstances dictate.

Other -----------------
- Windows Server 2003 : Using the Secondary Logon
- Windows Server 2003 : Using the Microsoft Management Console - Creating an MMC-Based Console with Snap-Ins
- Installing Windows Small Business Server 2011 : Selecting Network Components (part 2) - Preparing for the Installation
- Installing Windows Small Business Server 2011 : Selecting Network Components (part 1) - Selecting an Internet Service Provider
- Planning a Windows SBS 2011 Deployment
- Windows Small Business Server 2011 : A Networking Primer - Understanding Domains
- Windows Server 2008 : Using wbadmin (part 2) - Backing Up & Restoring Volumes with wbadmin
- Windows Server 2008 : Using wbadmin (part 1)
- Windows Home Server 2011 : Understanding Security Groups & Adding a New User
- Setting Up Your Windows Home Server 2011 Network : Handling Multiple Network Subnets & Making a Remote Desktop Connection to the Server
- Windows Small Business Server 2011 : A Networking Primer - Ethernet/IEEE 802.3 & TCP/IP Basics
- Windows Small Business Server 2011 : A Networking Primer - Networking Hardware
- Windows Server 2008 Server Core : Installing Applications with the MSIExec Utility
- Windows Server 2008 Server Core : Getting System Configuration Information with the SystemInfo Utility
- Setting Up Your Windows Home Server 2011 Network : Troubleshooting Network Problems (part 2)
- Setting Up Your Windows Home Server 2011 Network : Troubleshooting Network Problems (part 1)
- Windows Server 2008 : Working with Event Subscriptions - Managing Subscriptions with wecutil & Logging Events with eventcreate
- Windows Server 2003 : Managing Security Configuration with Security Templates (part 2)
- Windows Server 2003 : Managing Security Configuration with Security Templates (part 1)
- Setting Up Your Windows Home Server 2011 Network : Configuring Windows Home Server for Networking
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us