It really seems like you have a GPO that is setting these for you somewhere.








*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market...*




On Fri, Aug 8, 2014 at 12:10 PM, Heaton, Joseph@Wildlife <
[email protected]> wrote:

>  No, I just did a modeling, with the account I'm logging into the server
> with, and there are no auditing settings at all being applied through GPO
> to that box for me.
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Sean Martin
> *Sent:* Friday, August 08, 2014 7:55 AM
>
> *To:* [email protected]
> *Subject:* Re: [NTSysADM] Setting auditing in local security policy
>
>
>
> No chance that another gpo is being applied?
>
> - Sean
>
>
> On Aug 8, 2014, at 6:50 AM, "Heaton, Joseph@Wildlife" <
> [email protected]> wrote:
>
>  Yes, pretty much what I've been trying to do.  But it just doesn't seem
> to want to hold the settings.  We only need two sub-categories, so I left
> the basic auditing set to Success/Failure, and in the sub-categories, I set
> just the two that I need, leaving the rest at No Auditing.  But, if I go to
> a command prompt and run  auditpol.exe /get /category:*, it shows that all
> the subcategories are set to Success/Failure.  And I'm still getting tons
> of the 5156 events in the security log.  I even verified that I have the
> setting under Local Policies: Security Options:  "Audit: Force audit policy
> subcategory settings to override audit policy category settings" set to
> Enabled.  Even if I change the basic to No Auditing, if I close and reopen
> the Local Policy, it shows back up.
>
>
>
> I know I forgot to mention it before, but the servers in question are
> Server 2012 R2, in case there's differences.
>
>
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Sean Martin
> *Sent:* Thursday, August 07, 2014 9:36 PM
> *To:* [email protected]
> *Subject:* Re: [NTSysADM] Setting auditing in local security policy
>
>
>
> No idea if this is your answer, but I recently had to modify our audit
> policy to disable the filtering platform connection sub-category. Under
> Local Policy/Audit Policy, I left object access set to success/failure, and
> then under advanced audit policy settings/object access, I configured each
> option but left the success/failure option unchecked for filtering platform
> connection, which set it to no auditing.
>
> - Sean
>
>
> On Aug 7, 2014, at 8:13 PM, "Heaton, Joseph@Wildlife" <
> [email protected]> wrote:
>
>  I'm having a horrible time trying to get the right items audited.
> Started out with a GP, setting the basic auditing setting of Object Access
> to Success, Failure.  Unfortunately, this filled my security log with event
> id 5156 entries.  Did some research, and found these entries were from
> auditing of Filtering Platform Connection, which I don't need audited.
> Figured out exactly what I do need audited, which is File Share and Handle
> Manipulation.  Now, I can't get these settings to stick.  I've disabled all
> settings in the GPO that set the basic auditing, and on the file servers
> themselves, I've made sure that the basic Object Access is set to No
> Auditing, and the advanced settings are set to Success, Failure.
>
>
>
> On one server, when these are set, I reboot, and the basic setting is back
> to Success, Failure, which then enables all the subcategories as well.  On
> the other server, when I look at Local Security Policy, it looks like
> things are correct, but when I go to a command line and use:  *auditpol.exe
> /get /category:*, **it shows Object Access set to No Auditing for
> everything.*
>
>
>
> *Anyone have any advice?*
>
>
>
> Joe Heaton
>
> Enterprise Server Support
>
> Information Technology Operations Branch
>
> Data and Technology Division
>
> CA Department of Fish and Wildlife
>
> 1807 13th Street, Suite 201
>
> Sacramento, CA  95811
>
> Desk:  (916) 323-1284
>
>
>
>

Reply via email to