123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Implementing An Audit Policy

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Audit policies allow you to track user activities and 220-702 exam system-wide events in the security log in the Event Viewer console. In this lesson, you learn how to plan and set up an audit policy.
2.In the details pane, right-click the event category you want to audit, and then click Properties.
3.In the Properties dialog box for the event category, shown in Figure 13-10, click one or both of the following:
Q Success, to audit successful attempts for the event categoiy Q Failure, to audit failed attempts for the event category
4.Click OK.
5.Because the changes that you make to your computer's audit policy take effect only when the policy is propagated (applied) to your computer, do one of the following to initiate policy propagation:
Type gpupdate at the command prompt, and then press Enter. Restart your computer.
Wait for automatic policy propagation. By default, setting changes are applied every 90 minutes on a workstation or server (with a 30-minute random offset) and every five minutes on a domain controller. Settings automatically ...
... refresh eveiy 16 hours, regardless of any changes that are made.
Security auditing for get a+ certified online workstations, member servers, and domain controllers can be enabled remotely only by members of the Domain Administrators and Enterprise Administrators groups.
5.In the Apply Onto list, specify where objects are audited. By default, this box is set to This Object And All Child Objects, so any auditing changes that you make to a parent object also apply to all child objects. Where objects are audited depends on the selection in the Apply Onto list and whether the Apply These Auditing Entries
To Objects And/Or Containers Within This Container Only box is selected. These two features are enabled only for objects that act as containers.
6.Click OK to return to the Advanced Security Settings For dialog box for the object.
7.To prevent changes that are made to a parent folder from applying to the currently selected file or folder, clear the Allow Inheritable Auditing Entries From Parent To Propagate To This Object check box. If the check boxes in the Access box are shaded in the Auditing Entry For dialog box for the object, or if the Remove button is unavailable in the Advanced Security Settings free Microsoft practice tests For dialog box for the object,auditing has been inherited from the parent folder.
Click OK.

Total Views: 393Word Count: 390See All articles From Author

Add Comment

System/Network Administration Articles

1. Importance Of Enterprise Identity Management For Large Organizations
Author: adlerconway

2. Fiber Curing Oven: Ensuring Strong And Reliable Fiber Optic Connections
Author: Ryan

3. Dynamics 365 Finance Consultant Services
Author: brainbell10

4. Fiber Circulator: A Key Component In Optical Communication Systems
Author: Ryan

5. Edfa Amplifier: Powering Modern Optical Networks
Author: Ryan

6. How Online Safety Experts Help Businesses Stay Secure In A Connected World
Author: Deep Water

7. Roi Benefits Of Implementing The M-files Document Management System
Author: DocSmart Solutions

8. Mems Optical Switch: High-speed, Reliable Switching For Modern Fiber Optic Networks
Author: Ryan

9. Polarization Maintaining Fiber Cable: Ensuring Polarization Stability In Advanced Optical Systems
Author: Ryan

10. Optical Fiber Alignment System: The Foundation Of High-performance Fiber Optic Solutions
Author: Ryan

11. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri

12. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions

13. Best Online Cybersecurity Training Institute In India
Author: securium Academy

14. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan

15. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: