123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

To Configure A Printer For Auditing

Profile Picture
By Author: Mike Jones
Total Articles: 256
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Use the procedure provided earlier in this lesson to configure a Network+ certification printer for auditing. Audit the success of the Everyone group for all types of access to This Printer And Documents.
Exercise 5: Configuring an Active Directory Object for Auditing
In this exercise, you configure an Active Directory object for auditing.
To configure an Active Directory object for auditing
Use the procedure provided earlier in this lesson to configure the Users folder in the Active Directory Users And Computers console for auditing. Audit the success and failure of the Everyone group for Write All Properties and Delete for This Object Only.
Auditing is a tool for maintaining network security. Auditing allows you to track user activities and system-wide events.
An audit policy defines the categories of events recorded in the security log on each computer. You set the Audit Policy settings in the Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy extensions in a GPO. You use the security log in the Event Viewer ...
... console to view audited events.
You can audit both successful and failed attempts at actions, so the audit can show who performed actions on the network and who tried to perform actions that are not permitted.
For certain folders, such as the Windows folder, setting the security level to social networking benefits Disallowed can adversely affect the operation of your operating system. Make sure that you do not disallow a crucial component of the operating system or one of its dependent programs.
The following questions are intended to reinforce key information presented in this lesson. If you are unable to answer a question, review the lesson and then try the question again. Answers to the questions can be found in the "Questions and Answers" section at the end of this chapter.
1. What is the purpose of auditing?
2. Where can you view audited events?
3. What is an audit policy?
4. Which event categories require you to configure specific objects for auditing to log the events?
5. Which of the following event categories should you audit if you want to find out if an unauthorized person is trying to access a user account by entering random passwords or by using password-cracking software? Choose a+ certification all that apply.
a.Logon Events—success events
b.Logon Events—failure events
c.Account Logon—success events
d.Account Logon—failure events

Total Views: 416Word Count: 370See All articles From Author

Add Comment

System/Network Administration Articles

1. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan

2. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan

3. Fiber Cable Stripping Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan

4. 20% Off Pmp® Certification: Turn This Christmas Into A Career Milestone
Author: securium Academy

5. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

6. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

7. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

8. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

9. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab

10. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy

11. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan

12. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan

13. The Role Of Optical Waveguide Alignment Systems In Precision Optics And Telecommunications
Author: Ryan

14. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A Reality
Author: Tushar Pansare

15. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: