No chance that another gpo is being applied?

- Sean

> On Aug 8, 2014, at 6:50 AM, "Heaton, Joseph@Wildlife" 
> <[email protected]> wrote:
> 
> Yes, pretty much what I’ve been trying to do.  But it just doesn’t seem to 
> want to hold the settings.  We only need two sub-categories, so I left the 
> basic auditing set to Success/Failure, and in the sub-categories, I set just 
> the two that I need, leaving the rest at No Auditing.  But, if I go to a 
> command prompt and run  auditpol.exe /get /category:*, it shows that all the 
> subcategories are set to Success/Failure.  And I’m still getting tons of the 
> 5156 events in the security log.  I even verified that I have the setting 
> under Local Policies: Security Options:  “Audit: Force audit policy 
> subcategory settings to override audit policy category settings” set to 
> Enabled.  Even if I change the basic to No Auditing, if I close and reopen 
> the Local Policy, it shows back up.
>  
> I know I forgot to mention it before, but the servers in question are Server 
> 2012 R2, in case there’s differences.
>  
>  
> From: [email protected] [mailto:[email protected]] 
> On Behalf Of Sean Martin
> Sent: Thursday, August 07, 2014 9:36 PM
> To: [email protected]
> Subject: Re: [NTSysADM] Setting auditing in local security policy
>  
> No idea if this is your answer, but I recently had to modify our audit policy 
> to disable the filtering platform connection sub-category. Under Local 
> Policy/Audit Policy, I left object access set to success/failure, and then 
> under advanced audit policy settings/object access, I configured each option 
> but left the success/failure option unchecked for filtering platform 
> connection, which set it to no auditing.
> 
> - Sean
> 
> On Aug 7, 2014, at 8:13 PM, "Heaton, Joseph@Wildlife" 
> <[email protected]> wrote:
> 
> I’m having a horrible time trying to get the right items audited.  Started 
> out with a GP, setting the basic auditing setting of Object Access to 
> Success, Failure.  Unfortunately, this filled my security log with event id 
> 5156 entries.  Did some research, and found these entries were from auditing 
> of Filtering Platform Connection, which I don’t need audited.  Figured out 
> exactly what I do need audited, which is File Share and Handle Manipulation.  
> Now, I can’t get these settings to stick.  I’ve disabled all settings in the 
> GPO that set the basic auditing, and on the file servers themselves, I’ve 
> made sure that the basic Object Access is set to No Auditing, and the 
> advanced settings are set to Success, Failure.
>  
> On one server, when these are set, I reboot, and the basic setting is back to 
> Success, Failure, which then enables all the subcategories as well.  On the 
> other server, when I look at Local Security Policy, it looks like things are 
> correct, but when I go to a command line and use:  auditpol.exe /get 
> /category:*, it shows Object Access set to No Auditing for everything.
>  
> Anyone have any advice?
>  
> Joe Heaton
> Enterprise Server Support
> Information Technology Operations Branch
> Data and Technology Division
> CA Department of Fish and Wildlife
> 1807 13th Street, Suite 201
> Sacramento, CA  95811
> Desk:  (916) 323-1284
>  

Reply via email to