Тёмный
No video :(

Server 2016 And 2012 R2 - File And Folder Access Auditing And Monitoring 

Windows Ninja
Подписаться 10 тыс.
Просмотров 65 тыс.
50% 1

Опубликовано:

 

24 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 33   
@TheSysadminChannel
@TheSysadminChannel 5 лет назад
FYI at 2:25 you shouldn't need to have your default domain policy set to enforced. This means that any and all policies in an OU after it will NOT get the new policy if they are conflicting. I spent MONTHS trying to reverse engineer all the bad practices that were done because of this..
@adetayoalao8353
@adetayoalao8353 5 лет назад
So what is the right way if you are not supposed to enforce on DCP
@Atreus21
@Atreus21 4 года назад
Enforce does not mean active. It means it can overrule inheritance blocks in child OUs.
@marffvmarffv5438
@marffvmarffv5438 5 лет назад
Thank you so much for your cristal clear explanations !
@chakirhamza-uc8wv
@chakirhamza-uc8wv Год назад
please what is the advantages and disadvantages
@Sojah66
@Sojah66 6 лет назад
Thanks Bro !
@Aghabalayev
@Aghabalayev 8 лет назад
thank you so much
@GaudyGabriev02
@GaudyGabriev02 4 года назад
Need more "Ok"
@Windows10NinjaWorld
@Windows10NinjaWorld 4 года назад
OK ;)
@OFDM-network
@OFDM-network 4 года назад
Thats his style ok?
@SamerAbdallah1
@SamerAbdallah1 6 лет назад
kindly specify if this command is right? $Event | Format-List " >> 4663.txt
@Windows10NinjaWorld
@Windows10NinjaWorld 6 лет назад
What is the issue? Did it work or not? You do have a speech mark....
@bablisahu2445
@bablisahu2445 2 года назад
will it show past changes made?
@yvanthepcgamer7993
@yvanthepcgamer7993 Год назад
It sadly does not, cos that is actually what I need. But it only monitors actions of a current day. Meaning, you would have to save all the reports of that given day. cos the next day, it will not have the ones from yesterday anymore but then start with new events from the new day
@RhyzOrDie
@RhyzOrDie 4 года назад
I'm going to cut you some slack on the annnnnnnd and Okays but you should really not force your audience to listen to it by dropping timestamps in the description, that would be so awesome.
@Windows10NinjaWorld
@Windows10NinjaWorld 4 года назад
thanks for the advice - yes I am aware of the okays :)
@MrBarrichell0
@MrBarrichell0 6 лет назад
Too many "Ok"
@RichiRicheh
@RichiRicheh 4 года назад
LOL - this comment made me think of Dude Where's My Car - "And then....." - NO AND THEN!....."And then...." - NO AND THEN!....just made me watch this video with my mind swapping our And then with OK.
@neeraj79
@neeraj79 7 лет назад
Quick question, Perhaps you can clear my confusion. I have deployed a GPO that has the "Audit Object Access" enabled or say the "File Share" subcategory under Advanced Audit Policy settings enabled and now if i run a gupdate on my domain joined clients i see that the RSOP.msc shows these new settings in effect on the client. But why does running "Local Security Policy" mmc or secpol.msc on the same client still then shows AUDIT OBJECT ACCESS or the FILE SHARE settings as "Not configured" ? Shoudn't the Local Security snap-in then show these 2 settings as greyed out because i have enabled audit on them via a domain GPO ?
@Windows10NinjaWorld
@Windows10NinjaWorld 7 лет назад
Thank you for the question and it is interesting... because you have used gpupdate /force and then you are stating the status. As we all know the precedence of group policy objects is: 1. Local, 2. Site, 3. Domain 4. OU. So the later ones override the previous ones. So, my first point would be to reboot one of those computers (as gpupdate is a bit unstable sometimes and needs the reboot) and then see if the domain precedence is working. Let me know what is your status. If need be I could recreate your scenario to test outcomes.
@Windows10NinjaWorld
@Windows10NinjaWorld 7 лет назад
Another matter to think about - are you accessing those devices as local admin... as that could affect this matter.
@Windows10NinjaWorld
@Windows10NinjaWorld 7 лет назад
I draw your attention to: blogs.technet.microsoft.com/markrussinovich/2005/04/30/circumventing-group-policy-settings/
@neeraj79
@neeraj79 7 лет назад
Thanks for responding. I have rebooted my clients and there is no change in the result. I have tried replicating it in a lab environment and i am getting the same results. Can you try replicating it on your end ? I wish there was an option to share screenshots here, else i would have done that with you. This is what i am experiencing: - Try deploying any "Advanced Audit Policy Configuration" to your domain joined pc's. I for instance enabled Success and Failure for "File System" and "File Share" sub categories under Advanced. - Upon doing a "gpupdate /force" OR rebooting the client PC's, you will notice that "gpresult /H report.html" command shows the new GPO settings being applied. However, if you open up the Local Security Policy , these Audit settings that you just pushed in the GPO show as "NOT CONFIGURED" and it lets you manually configure it. These should be grayed out in theory because we have deployed the GPO for the same. Trying running a RSOP.msc on the client and it does not even show the Advanced Audit Policy Configuration option . Try running " auditpol /get /category:* " command on the client and the output shows correctly that under Object Access category >> both File System and File Share show as "Success and Failure" So in a nutshell how is it that auditpol shows the correct output while rsop and secpol.msc both don't reflect or don't show any of the settings i deployed
@christerhjerpe618
@christerhjerpe618 5 лет назад
okey?
@muhammadhilmyhabiebie.6033
@muhammadhilmyhabiebie.6033 5 лет назад
ok saya g ngerti
@MatthewScars
@MatthewScars 6 лет назад
AAAAAAAAAAAAAAND
@jacksilver4351
@jacksilver4351 5 лет назад
showed all basic config but still NOTHING really on getting the file to show up in event viewer. The auditing process is just overall terrible, thanx Microsoft fucking POS
@funingwang430
@funingwang430 3 года назад
Get-WinEvent -FilterHashtable @{logname= 'security'; id=4663; starttime='9/20/2020'}
Далее
Setting up Auditing in Windows Server 2012 R2
11:11
Просмотров 49 тыс.
拉了好大一坨#斗罗大陆#唐三小舞#小丑
00:11
УГАДАЙ ЕДУ ПО ЭМОДЗИ! #shorts
00:57
Просмотров 190 тыс.
Kerberos Authentication Explained | A deep dive
16:52
Просмотров 339 тыс.
MCITP 70-640: Active Directory Windows Auditing
13:43
Windows 10 - Sysinternals Process Explorer Tool Usage
10:06
Transport Layer Security (TLS) - Computerphile
15:33
Просмотров 476 тыс.
Understanding Active Directory and Group Policy
51:56
拉了好大一坨#斗罗大陆#唐三小舞#小丑
00:11