O'Reilly logo

MCTS Windows Server® 2008 R2 Complete: Study Guide by William Panek

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Implementing an Audit Policy

One of the most important aspects of controlling security in networked environments is ensuring that only authorized users are able to access specific resources. Although systems administrators often spend much time managing security permissions, it is almost always possible for a security problem to occur.

Sometimes, the best way to find possible security breaches is to actually record the actions specific users take. Then, in the case of a security breach (the unauthorized shutdown of a server, for example), systems administrators can examine the log to find the cause of the problem.

The Windows Server 2008 R2 operating system and Active Directory offer you the ability to audit a wide range of actions. In the following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required