Tag: Windows Server audit
December 9, 2022 |
Windows File Access Monitoring
In this post, we will dive into how to configure file access auditing on a Windows file server and explore the challenges with interpreting critical access events.
Background
The first step in developing an effective audit strategy is to gain a good understanding of your systems,...
August 23, 2018 |
Auditing Windows Systems
Continuously auditing the activity in your network is one of the most critical security best practices, since it helps you notice potentially malicious activity early enough to take action and prevent data breaches, system downtime and compliance failures. Top methods of Windows auditing...
August 24, 2017 |
File and Folder Auditing on Windows Server 2003 and 2008
Auditing files and folders got much easier with Global Object Access auditing in Windows Server 2008 R2 and Windows 7. However, if your organization is still running Windows Server 2008, or earlier, for instance Windows Server 2003, setting up file and folder auditing will be a little more...
November 25, 2014 |
Ten Simple Ways to Prevent Security Breaches in Windows File Server 2012
File server is the central location in any network containing all kinds of information which is saved and shared by users within the organization. There is no restriction on the type of information used and shared. Since it is one of the most common reach out place for the users in the...
May 7, 2014 |
Will the Guilty Party Please Stand Up!
Today we are going to talk about finding “lost” files with File Server auditing. But first, how many of you are aware that users have a lot in common with a five year old?
Now, before I start getting hate mail, before folks start driving by my house and shooting at it (warning, I shoot back)...
November 11, 2013 |
Best Practices for Change Management in the Data Center
When it comes to change management, Scott Matteson gets it. Too many companies today make changes without any kind of change management in place. Scott's approach even includes the mandated use of individual accounts to perform changes so that Auditing of system changes can easily be tied back to...
November 7, 2013 |
Death by Event Log Overload
When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can be found in Event Logs.
So, if companies today already have all necessary data that points...
October 18, 2013 |
Top 6 Security Breaches that Auditing Would have Prevented
Because IT security breaches have become so prevalent, the common model for addressing them is often more reactive than proactive. Have you given up and given in to the idea that breaches are inevitable? Money, time and effort is put into establishing incident response teams, but often preventative...
August 19, 2013 |
Free Cheat Sheet on File Server Auditing
Our next FREE cheat sheet is devoted to auditing changes in the File Server. In this quick guide you'll find the information about required system configurations, HOW-TOs and event IDs that could be helpfull you when auditing your File Servers.
Click here to download this FREE guide, no...
April 2, 2013 |
Fast and Simple DNS Auditing
Microsoft DNS (Domain Name Service) is the service for all computer name resolution for both the Internet and also for Microsoft’s Active Directory. Every web browser request, every Active Directory logon, every email that is routed touches DNS somehow. Within DNS every computer or web site is...