Archive for the ‘Auditing’ Category

Before I tackle this issue, it’s important to first state that this isn’t going to be another “event viewer sucks” bashing blog. That kind of article is one-sided and unhelpful in the face of an IT Pro like you trying to find real answers. But it is a fair question, and needs to be addressed by looking at native auditing from a few angles. The question isn’t just about the … Read more

Server systems are the pillars of an organization’s working environment, and they should be up and running at all times, without any interruptions. If a server crashes or goes down because of an unwanted change, users will not be able to work. Such problematic changes can be a result of IT administrator’s testing of a new policy in a live environment or because of unwelcome access. , this is very … Read more

IT audits are never fun, but surviving an IT audit is largely just a matter of being able to give the auditors the information that they ask for and being able to prove that you are adhering to established procedure. Of course there are many different types of IT audits and each has its own unique nuances, but there are some general best practices that tend to apply across the … Read more

One of the best ways to know what is happening within your organizational environment is through auditing. Windows Server 2012 Active Directory provides the option to monitor operations performed on the domain and log such information in the Event Viewer. It can log both the successful and failure operations, depending on the audit configuration. As an administrator, you can audit these logs to understand what action was performed by whom … Read more

LepideAuditor for File Server (LAFS) is a one-stop solution to audit the file servers in an organization. It audits the events of all files and folders on the server, including shared folder such as access, create, delete, modify, and copy. Easy-to-use interface lets a user add the File Server, create an audit policy, create a rule, and the auditing will be started instantly. It will show every change in the … Read more

The purpose of this post is to define the process to audit the successful or failed logon and logoff attempts in the network using the audit policies. “Audit Logon Events” and “Audit Account Logon Events”, meant for monitoring the logon/logoff events, are disabled by default. It is required to enable these policies manually. Before going to learn how to enable these policies, it is important to know in brief about … Read more

Android is the most widely used Operating Systems for smart devices like smartphones and tablets. Its popularity and usage to browse the World Wide Web had already surpassed that of Windows devices and computers. Seeking their popularity the IT professionals are already using the third party apps for connecting with their File Servers, taking remotes of their machines, and managing their servers. These apps are serving their purpose for which … Read more

Article Author: Peter Gubarevich (MVP – Enterprise Security), Certified Ethical Hacker Everything was just fine until yesterday. Usually, I’m managing local group membership using Active Directory Group Policies, either Restricted Groups node, or GP Preferences node. It’s quite questionable which node to choose, but anyway, Group Policy makes it easy to perform updates and enforce membership throughout a domain, and exactly fits my requirements. However, there’s another side of the … Read more

In today’s modern era of cloud computing organizations are deploying wide range of network security tools to ensure foolproof security of network. The implementation of firewalls, antivirus, Network Intrusion Detection Systems (NIDS) etc. doesn’t mean that the network is fully secured. To keep any network’s security up to date it is must for administrators that they should keep analyzing the user generated, system generated, and security tools generated logs on … Read more

In today’s computing world, File Servers serve pragmatic purpose by allowing to access data through shared disk access. Workstations attached to a network can access data such as documents, files, folders, images, videos, databases, etc. through File Servers. Thus, they definitely serve as potent sources of data management. But being accessible by a wide range of users, they are equally vulnerable to organizational misuse. Therefore, dedicated File Server Auditing becomes … Read more