ALL >> System-Network-Administration >> View Article
Implementing An Audit Policy
Audit policies allow you to track user activities and 220-702 exam system-wide events in the security log in the Event Viewer console. In this lesson, you learn how to plan and set up an audit policy.
2.In the details pane, right-click the event category you want to audit, and then click Properties.
3.In the Properties dialog box for the event category, shown in Figure 13-10, click one or both of the following:
Q Success, to audit successful attempts for the event categoiy Q Failure, to audit failed attempts for the event category
4.Click OK.
5.Because the changes that you make to your computer's audit policy take effect only when the policy is propagated (applied) to your computer, do one of the following to initiate policy propagation:
Type gpupdate at the command prompt, and then press Enter. Restart your computer.
Wait for automatic policy propagation. By default, setting changes are applied every 90 minutes on a workstation or server (with a 30-minute random offset) and every five minutes on a domain controller. Settings automatically ...
... refresh eveiy 16 hours, regardless of any changes that are made.
Security auditing for get a+ certified online workstations, member servers, and domain controllers can be enabled remotely only by members of the Domain Administrators and Enterprise Administrators groups.
5.In the Apply Onto list, specify where objects are audited. By default, this box is set to This Object And All Child Objects, so any auditing changes that you make to a parent object also apply to all child objects. Where objects are audited depends on the selection in the Apply Onto list and whether the Apply These Auditing Entries
To Objects And/Or Containers Within This Container Only box is selected. These two features are enabled only for objects that act as containers.
6.Click OK to return to the Advanced Security Settings For dialog box for the object.
7.To prevent changes that are made to a parent folder from applying to the currently selected file or folder, clear the Allow Inheritable Auditing Entries From Parent To Propagate To This Object check box. If the check boxes in the Access box are shaded in the Auditing Entry For dialog box for the object, or if the Remove button is unavailable in the Advanced Security Settings free Microsoft practice tests For dialog box for the object,auditing has been inherited from the parent folder.
Click OK.
Add Comment
System/Network Administration Articles
1. Fbt Optical Fiber Splitter Vs. Plc Optical Fiber SplitterAuthor: Ryan
2. Know More About The Optical Fiber Alignment System
Author: Ryan
3. Fiber Optic Pigtail: What Is It And What Are Its Types?
Author: Ryan
4. Comprehensive Introduction Of Fiber Optic Splitter
Author: Ryan
5. Know About The Fiber Polishing Parameters
Author: Ryan
6. Basic Introduction To Ic Substrate China
Author: Ryan
7. Pcba Manufacturing In China: A Global Hub
Author: Ryan
8. You Can Get The Details Idea About Miniaturization In Csp Substrates
Author: Ryan
9. Fiber Fused Biconical Taper Systems And Fiber Cable Cutting Machine Potential
Author: Ryan
10. Understanding Polarization Maintaining Fiber Rotation Systems And Their Applications
Author: Ryan
11. Cat6a Patch Cable: The Best Preference For Comprehensive Cabling
Author: Ryan
12. A Brief Idea About The Mtp/mpo Cables And Their Use
Author: Ryan
13. 5 Reasons Why A Smart Bus Ticketing System Is The Future Of Public Transport
Author: Limon
14. How To Implement Technology In Your Inbound Call Center?
Author: DialDesk
15. How To Choose An Enterprise Help Desk It Support Company
Author: Entrust Network Services