Partager via


File Access Auditing - I Am Not Afraid Of GPO

Security logging and auditing mitigates repudiation threat (the "R" in STRIDE, see also Auditing and Logging threats). The lesser coding the better security. Here is the no coding auditing for file access using Group Policy

From https://support.microsoft.com/kb/324739

 

Create a Group Policy Object

To create a Group Policy object (GPO) that you can use to turn on auditing in a domain, follow these steps:

1. Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

2. Right-click your domain, and then click Properties.

3. Click the Group Policy tab, and then click New.

4. Type the name that you want to use for this policy (for example, Enable auditing policy), and then press ENTER.

5. Click Properties, and then click the Security tab.

6. Click to clear the Allow check box next to Apply Group Policy for the security groups that you want to prevent from having this policy applied.

7. Click to select the Allow check box next to Apply Group Policy for the groups to which you want to apply this policy, and then click OK.

8. Click OK, click OK again, and then quit Active Directory Users and Computers.

Turn On Auditing on a Domain Controller

1. Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

2. Right-click your domain, and then click Properties.

3. Click the Group Policy tab, click the Group Policy object that you want to use, and then click Edit.

4. Under Computer Configuration, expand Windows Settings, expand Security Settings, expand Local Policies, and then click Audit Policy.

5. In the right pane, double-click Audit object access.

6. Click to select the Define these policy settings check box, click to select the Success check box, click to select the Failure check box, and then click OK.

Define auditing on actual file:

Test auditing by accessing the file, say double clicking it, then open Event Viewer.

Similar entry should be there:

Enjoy

Comments

  • Anonymous
    April 03, 2007
    In my post File Access Auditing - I Am Not Afraid Of GPO I've digested technet documentation on how to
  • Anonymous
    April 05, 2007
    Identity story with .Net really rocks, but along with great extensibility it also brings a lots of confusion
  • Anonymous
    April 08, 2007
    If these articles: How To: Implement Kerberos Delegation for Windows 2000 How To: Use Impersonation and
  • Anonymous
    April 10, 2007
    If these articles: How To: Use Protocol Transition and Constrained Delegation in ASP.NET 2.0 Using Protocol
  • Anonymous
    April 10, 2007
    If these articles: How To: Use Protocol Transition and Constrained Delegation in ASP.NET 2.0 Using Protocol
  • Anonymous
    January 21, 2008
    A few years ago, I recall needing to know (programmatically) which user has accessed a particular file