Auditing Specific Events
Part 3 in our series on auditing Windows 2000 security helps you refine your auditing techniques.
So far in this series, I've explained the importance of auditing and given you some guidelines for establishing an effective audit policy. However, the greatest audit policy in the world does little good without proper implementation. In Part 2 ( Setting Up an Audit Policy ), I began discussing some techniques you can use to audit various situations. These auditing techniques need refinement before they become truly effective; in this article, I'll show you how to target your audit policy toward specific events.
Auditing Files and Folders
- Use My Computer to navigate to a file or folder you want to audit. This file or folder must be on an NTFS partition.
- Right-click on the file or folder and select Properties from the resulting context menu.
- In the object's properties sheet, select the Security tab. Click Advanced to access the object's Access Control Settings.
- Select the Access Control Settings properties sheet's Auditing tab. Select the Auditing tab, and you're ready to begin implementing the auditing process.
Before you begin adding audit policy entries to the object, you need to be aware of two check boxes at the bottom of this window. The first check box is labeled Allow Inheritable Auditing Entries From Parent To Propagate To This Object. This check box is selected by default. Its function is to automatically apply the same audit settings to the object as apply to the object's parent. For example, suppose you have a directory called TEST that contains a subdirectory called A. If this setting is enabled and auditing is applied to TEST, the same auditing will automatically apply to TEST\A.
The second check box is Reset Auditing Entries On All Child Objects And Enable Propagation Of Inheritable Auditing Entries. This check box's function is to reset the auditing entries of child objects so that they will inherit their parent's audit policy. This property is good for clearing out an unwanted audit policy.
Now that you know how the two check boxes work, let's take a look at the actual process of auditing a directory:
- Click Add. When you do, you'll see a list of groups. As you may recall, in Windows NT, auditing a directory involved making an audit log entry any time anyone accessed the directory. In Windows 2000, you can audit only specific groups of people.
- Select the group you want to audit from the list and click OK. When you do, you'll see a long list of actions that members of the group could potentially perform. You can implement a success or a failure audit on any of these actions. For example, you could make an audit entry if a member of the Guest group tries to delete a file. You can see most of the actions that can be audited in Figure 1.