Auditpol get
Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Vista
Retrieves the system policy, per-user policy, auditing options, and audit security descriptor object.
For examples of how this command can be used, see Examples.
Syntax
Auditpol /get
[/user[:<username>|<{sid}>]]
[/category:*|<name>|<{guid}>[,:<name|<{guid}>…]]
[/subcategory:*|<name>|<{guid}>[,:<name|<{guid}>…]]
[/option:<option name>]
[/sd]
[/r]
Parameters
Parameter | Description |
---|---|
/user |
Displays the security principal for whom the per-user audit policy is queried. Either the /category or /subcategory parameter must be specified. The user may be specified as a security identifier (SID) or name. If no user account is specified, then the system audit policy is queried. |
/category |
One or more audit categories specified by globally unique identifier (GUID) or name. An asterisk (*) may be used to indicate that all audit categories should be queried. |
/subcategory |
One or more audit subcategories specified by GUID or name. |
/sd |
Retrieves the security descriptor used to delegate access to the audit policy. |
/option |
Retrieves the existing policy for the CrashOnAuditFail, FullPrivilegeAuditing, AuditBaseObjects, or AuditBaseDirectories options. |
/r |
Displays the output in report format, comma-separated value (CSV). |
/? |
Displays help at the command prompt. |
Remarks
All categories and subcategories can be specified by the GUID or name enclosed by quotation marks. Users can be specified by SID or name.
For all get operations for the per-user policy and system policy, you must have Read permission on that object set in the security descriptor. You can also perform get operations by possessing the Manage auditing and security log (SeSecurityPrivilege) user right. However, this right allows additional access that is not necessary to perform the get operation.
Examples
Examples for the per-user audit policy
To retrieve the per-user audit policy for the Guest account and display the output for the System, Detailed Tracking, and Object Access categories, type:
Auditpol /get /user:{S-1-5-21-1443922412-3030960370-963420232-51} /category:"System","Detailed Tracking","Object Access"
Note
This command is useful in two scenarios. When monitoring a specific user account for suspicious activity, you can use the /get command to retrieve the results in specific categories by using an inclusion policy to enable additional auditing. Or, if audit settings on an account are logging numerous but superfluous events, you can use the /get command to filter out extraneous events for that account with an exclusion policy. For a list of all categories, use the auditpol /list /category command.
To retrieve the per-user audit policy for a category and a particular subcategory, which reports the inclusive and exclusive settings for that subcategory under the System category for the Guest account, type:
Auditpol /get /user:guest /category:"System" /subcategory:{0ccee921a-69ae-11d9-bed3-505054503030}
To display the output in report format and include the machine name, policy target, subcategory, subcategory GUID, inclusion settings, and exclusion settings, type:
Auditpol /get /user:guest /category:Detailed Tracking" /r
Examples for the system audit policy
To retrieve the policy for the System category and subcategories, which reports the category and subcategory policy settings for the system audit policy, type:
Auditpol /get /category:"System" /subcategory:{0ccee921a-69ae-11d9-bed3-505054503030}
To retrieve the policy for the Detailed Tracking category and subcategories in report format and include the machine name, policy target, subcategory, subcategory GUID, inclusion settings, and exclusion settings, type:
Auditpol /get /category:"Detailed Tracking" /r
To retrieve the policy for two categories with the categories specified as GUIDs, which reports all the audit policy settings of all the subcategories under two categories, type:
Auditpol /get /category:{69979849-797a-11d9-bed3-505054503030},{69997984a-797a-11d9-bed3-505054503030} subcategory:{0ccee921a-69ae-11d9-bed3-505054503030}
Examples for auditing options
To retrieve the state, either enabled or disabled, of the AuditBaseObjects option, type:
Auditpol /get /option:AuditBaseObjects
Note
The available options are AuditBaseObjects, AuditBaseOperations, and FullPrivilegeAuditing.
To retrieve the state—enabled, disabled, or 2—of the CrashOnAuditFail option, type:
Auditpol /get /option:CrashOnAuditFail /r