System Audit Policy
Applies To: Windows Server 2008
You can use this page to create an audit policy for servers in your organization. Auditing is the process that tracks the activities of users and records selected types of events in the security log. An audit policy defines the types of events that you want to collect.
Collecting and monitoring audit events consumes disk space and other resources. Before selecting an audit policy, review "Auditing Security Events Best Practices" (https://go.microsoft.com/fwlink/?LinkId=92229).
You can use Microsoft Operations Manager (MOM) to collect audit events from multiple servers at a single repository.
The following table describes each of the three audit policy objectives that you can select with the Security Configuration Wizard (SCW).
Audit policy objective | Description | Audit event type and policy settings | ||
---|---|---|---|---|
Do not audit |
No auditing is performed. CPU cycles and disk space are spared so that other processes can have better performance.
|
None |
||
Audit successful activities |
Auditing successful activities results in fewer event log entries than auditing both successful and unsuccessful activities. Use this option to record only what users actually access, not what they try to access. Note If you only audit successful activities, then unauthorized intrusion attempts will not appear in the log. Unauthorized intrusion attempts are characterized by large numbers of unsuccessful activities.
|
Audit account logon events: Success, Failure Audit account management: Success Audit directory service access: Success Audit logon events: Success, Failure Audit object access: Success Audit policy change: Success Audit privilege use: Not audited Audit process tracking: Success Audit system events: Success, Failure |
||
Audit successful and unsuccessful activities |
This means that you intend to use audit events to track the attempts of users to gain access to areas for which they are not authorized, in addition to tracking successful task completion. Note Do not select Audit successful and unsuccessful activities unless you review security logs regularly. If users attempt to access a resource for which they are not authorized, they can create so many failure audits that the security log becomes full. When the security log is full, the oldest audit entries are overwritten.
|
Audit account logon events: Success, Failure Audit account management: Success, Failure Audit directory service access: Success, Failure Audit logon events: Success, Failure Audit object access: Success, Failure Audit policy change: Success, Failure Audit privilege use: Not audited Audit process tracking: Success, Failure Audit system events: Success, Failure |