Frame Corner

Frame Top

GSW Study Notes Home

Module 9: Auditing Resources and Events

Introduction to Auditing
Planning an Audit Policy

Note: To much auditing can create excessive overhead on the system. If your server is heavily used, you may need to keep auditing to a minimum.

Implementing an Audit Policy
Auditing Requirements
Defining an Audit Policy
  1. Logon and Logoff  --> user logged on or off.
  2. File and Object Access --> user accessed directory, file or printer.
  3. Use of User Rights --> user exercised a right.
  4. User and Group Management --> user account or group was created, changed or deleted. This includes password changes
  5. Security Policy Changes  --> change was made to the user rights, audit or trust relationship policies
  6. Restart, Shutdown and System --> user restarted or shut down the computer or an event has occurred that affects system security or the security log. (e.g. the audit log fills up and entries are discarded)
  7. Process Tracking --> detailed tracking information for various events, such as program activation.
Auditing files and directories
Auditing a Printer
Using Event Viewer
Viewing Security Logs

To view a log on a remote computer in another domain

Locating Events
Archiving the Security Log
Best Practices
Audit the Everyone Group instead of the Users Group - this means anyone who can connect to the network is audited.

 

Top of Page Top of page

E-mail Me! Comments and suggestions? E-mail me at grantwilson21@yahoo.com
I'm sorry, but I can't answer specific network-related, or exam-related questions.
Last Updated: August 6, 2001 Grant Wilson, Edmonton, AB Canada