programming4us
 
Windows
 

Windows Server 2012 : Managing Users and Data with Dynamic Access Control - Auditing

1/14/2015 8:14:40 PM

Auditing is yet another component of Dynamic Access Control that, while not new to Windows Server, has undergone a refresh. Windows Server 2008 and 2008 R2 will create audit events anytime a file is accessed, but auditing in Server 2012 is centralized and more sophisticated.

With file access auditing in Server 2012, you can track changes to central access rules and policies, claims definitions, file attributes, and, of course, data access.

If you have been or currently are a Windows server administrator, you already understand the importance of auditing. Auditing is critical for those aforementioned compliance regulations, where federal rules demand that certain organizations know who is accessing what. Auditing is also important for internal security—to protect a company’s intellectual property and to prevent data leakage.

While Microsoft has strengthened auditing with Windows Server 2012, the company is going even further, working with partners on solutions for powerful interpretation and analysis of audits. Microsoft’s own System Center Operations Manager (SCOM) will work with Server 2012 in providing audit analysis tools.

There are a couple of steps required for configuring auditing in a domain. First, you have to configure a Global Object Access Policy. Launch Group Policy Management and navigate to Computer ConfigurationPoliciesWindows SettingsSecurity SettingsAudit PoliciesObject AccessAudit File System Properties.

Check the boxes to enable “Configure the following audit events,” Success, and Failure. (See Figure 1.)

From the navigation pane, under “Audit policies,” double-click Global Object Access Auditing. Check the box next to “Define this policy setting,” and then click Configure.

The resulting window is the Advanced Security Settings for Global File SACL (security access control lists). Click Add, then “Select a principal.” For a global policy, you will typically select Everyone, Full Control, and then Permissions.

Here’s where you set the conditions you want to audit. For example, if you want to audit what’s happening with Payroll shares and files, you would set:

[Resource][Department][Any of][Value][Payroll]

Now, click OK three times and return to the navigation pane. From there, to finish configuration, click Object Access, double-click Audit Handle Manipulation, and make sure that “Configure the following audit events,” Success, and Failure are all checked.

Configuring an audit event in Group Policy Management
Figure 1. Configuring an audit event in Group Policy Management

Once you set up an audit policy for the domain, it’s good practice to force a Group Policy update. To verify whether your audit settings are correct—for example, on a shared folder you may have applied against—you modify a file in the share and check the Event Viewer for events 4656 and 4663.

 
Others
 
- Windows Server 2012 : Managing Users and Data with Dynamic Access Control - Access Denied Remediation
- Xbox LIVE and Windows 8 (part 3) - Xbox Companion
- Xbox LIVE and Windows 8 (part 2) - Xbox Games
- Xbox LIVE and Windows 8 (part 1) - Xbox LIVE Accounts
- Xbox Games with Windows 8 : Finding and Acquiring Desktop Games
- Xbox Games with Windows 8 : Finding and Acquiring Games for Windows 8
- Xbox Games with Windows 8 : Games and the Metro Environment
- Windows 8 : Conquering Viruses and Spyware with Windows Defender (part 3) - Excluding files and folders, Advanced configuration options
- Windows 8 : Conquering Viruses and Spyware with Windows Defender (part 2) - Performing a custom scan, Preventing malicious software using real-time scanning
- Windows 8 : Conquering Viruses and Spyware with Windows Defender (part 1) - Removing malicious software from your computer
 
 
REVIEW
 
- First look: Apple Watch

- 10 Amazing Tools You Should Be Using with Dropbox

- Sigma 24mm f/1.4 DG HSM Art

- Canon EF11-24mm f/4L USM

- Creative Sound Blaster Roar 2

- Alienware 17 - Dell's Alienware laptops

- Smartwatch : Wellograph

- Xiaomi Redmi 2
 
VIDEO TUTORIAL
 
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
 
Popular tags
 
Video Tutorail Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
 
Top 10
 
- How To Install Android Market & Google Apps On Kindle Fire
- How To Make Ubuntu Look Like Windows 7
- How To Add A New Account in MS Outlook 2013
- Get Android & Mac OS X Style Gadgets For Windows 7 & Windows 8 With XWidget
- How To Activate Microsoft Office 2013
- How To Install Actual Facebook App On Kindle Fire
- How To Create, View And Edit Microsoft Office Files On Kindle Fire
- Download Attractive Business PowerPoint Templates For Free At SlideHunter
- How To Use And Enable Hibernate & Sleep Mode In Windows 8
- How To Get Microsoft Office 2013 Trial Product Key From Microsoft