IT tutorials
 
Technology
 

Enabling Security Auditing on Windows Home Server (part 1) - Activating the Auditing Policies

9/15/2013 7:26:03 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

A big part of keeping any computer secure involves examining what users do with the computer. For Windows Home Server, this means tracking events such as logon failures (repeated failures might indicate a malicious user trying different passwords) and account changes (in which someone changes some aspect of a user account). This type of tracking is called auditing.

Note

Since Windows Home Server 2011 is built upon Windows Server 2008 R2, you see the same auditing policies as you would if you were working with a pure Windows Server 2008 R2 system. However, there are many Windows Server 2008 R2 auditing policies that don’t apply to Windows Home Server; for example, it’s useless to audit accesses to Active Directory (AD) objects because Windows Home Server doesn’t support AD.


In the next section, I show you how to enable the security auditing policies in Windows Home Server, and then I explain how to track auditing events.

1. Activating the Auditing Policies

To enable Windows Home Server’s security auditing policies, follow these steps:

1.
Log on to Windows Home Server.

2.
Select Start, Administrative Tools, Local Security Policy. The Local Security Policy window appears.

Tip

You can also open the Local Security Settings window by selecting Start, typing secpol.msc, and pressing Enter.

3.
Open the Local Policies branch, and click Audit Policy. Windows Home Server displays the audit policies, as shown in Figure 1.

Figure 1. Windows Home Server’s audit policies.

4.
Double-click the policy you want to work with.

5.
If you want to know when someone uses the policy event successfully, activate the Success check box.

6.
If you want to know when someone uses the policy event unsuccessfully, activate the Failure check box.

7.
Click OK.

8.
Repeat steps 4–7 for the other events you want to audit.
 
Others
 
- Microsoft Exchange Server 2010 : Getting Help (part 2) - Learning from the Graphical User Interface
- Microsoft Exchange Server 2010 : Getting Help (part 1) - Help from the Command Line
- Microsoft Exchange Server 2010 : Managing Contacts (part 2)
- Microsoft Exchange Server 2010 : Managing Contacts (part 1) - Creating Mail-Enabled Contacts
- Microsoft Lync Server 2010 : Exchange 2010 and SharePoint 2010 Integration - Exchange 2010 Unified Messaging Architecture
- Microsoft Lync Server 2010 : Exchange 2010 and SharePoint 2010 Integration - Call Answering Rules
- Microsoft Lync Server 2010 : Exchange 2010 Unified Messaging
- BlackBerry Development : Pushing Data to Internal Users - Controlling Access to Push, Locating Internal Push Recipients
- BlackBerry Development : Pushing to a Java Application,The Enterprise Push Process
- SQL Server 2008 : Task automation and alerts (part 2) - Event alerts, Error logs
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us