05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

16-36 Chapter 16 Configuring Security Settings and Internet Options<br />

Lesson 5: Implementing an Audit Policy<br />

Auditing allows you to track both user activities and Windows XP Professional events<br />

on a computer. Through auditing, you can specify that Windows XP Professional<br />

records activities and events to a security log, which maintains a record of valid and<br />

invalid logon attempts and events related to creating, opening, or deleting files or other<br />

objects. An audit entry in the security log contains the following information:<br />

■ The action that was performed<br />

■ The user who performed the action<br />

■ The success or failure of the event and when the event occurred<br />

After this lesson, you will be able to<br />

■ Describe the purpose of auditing.<br />

■ Determine what you should audit.<br />

■ Configure an audit policy.<br />

■ Enable auditing for files and folder.<br />

■ Enable auditing for printers.<br />

Estimated lesson time: 60 minutes<br />

Overview of Auditing<br />

An audit policy defines the types of security events that Windows XP Professional<br />

records in the security log on each computer. The security log allows you to track the<br />

events that you specify.<br />

Windows XP Professional writes events to the security log on the computer on which<br />

the event occurs. For example, you can configure auditing so that anytime someone<br />

tries to log on and the logon attempt fails, Windows XP Professional writes an event to<br />

the security log on that computer.<br />

You can set up an audit policy for a computer to do the following:<br />

■ Track the success and failure of events, such as logon attempts by users, an<br />

attempt by a particular user to read a specific file, changes to a user account or to<br />

group memberships, and changes to your security settings<br />

■ Eliminate or minimize the risk of unauthorized use of resources<br />

You use Event Viewer to view events that Windows XP Professional has recorded in<br />

the security log. You can also archive log files to track trends over time—for example,<br />

to determine the use of printers or files or to verify attempts at unauthorized use of<br />

resources. This lesson covers configuring an audit policy and enabling auditing of var-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!