Tough gig then. Looks like you're going to be doing a lot of creative stuff
with *dumpel.exe* and the *findstr* command :-)

On 28 July 2010 13:06, Ziots, Edward <ezi...@lifespan.org> wrote:

>  I don’t have SCOM, I wish I had some event log auditing solution, been
> asking for 5+ yrs, and all it ever falls on is deaf ears….
>
>
>
> Z
>
>
>
> Edward E. Ziots
>
> CISSP, Network +, Security +
>
> Network Engineer
>
> Lifespan Organization
>
> Email:ezi...@lifespan.org <email%3aezi...@lifespan.org>
>
> Cell:401-639-3505
>
>
>
> *From:* Malcolm Reitz [mailto:malcolm.re...@live.com]
> *Sent:* Tuesday, July 27, 2010 6:29 PM
>
> *To:* NT System Admin Issues
> *Subject:* RE: Auditing in Windows 2008 and R2 what are folks doing?
>
>
>
> Have you looked in to using the Audit Collection Services piece of SCOM? I
> think ACS could be valuable for security event reporting and forensics use.
>
>
>
> -Malcolm
>
>
>
> *From:* James Rankin [mailto:kz2...@googlemail.com]
> *Sent:* Tuesday, July 27, 2010 15:41
> *To:* NT System Admin Issues
> *Subject:* Re: Auditing in Windows 2008 and R2 what are folks doing?
>
>
>
> I'm mainly interested in account lockouts, logons attempted under things
> like built-in administrator accounts, high numbers of logon failures, and
> any attempts to modify security policies and/or protected groups (such as
> local admins, domain admins, server ops, and the like). We've also got
> certain areas where file access is audited.
>
> I use SCOM to try and aggregate the events for me. This is quite handy, as
> it also monitors things like failed su to root on our ESX servers and other
> stuff outside of the Windows event logging arena.
>
> On 27 July 2010 20:15, Ziots, Edward <ezi...@lifespan.org> wrote:
>
> Hey gang, well I wanted to ask the group, what is everyone doing about
> their audit policies on Windows 2008 R2 for domain controllers or member
> servers.
>
>
>
> I have mapped out all the audit categories and sub-categories, and events,
> but I don’t want the logs to turn into soup, so kinda wanted to see what
> others were doing for which categories and subcategories they turned on
> auditing for. Would be nice to bounce some ideas off about certain events. (
> Already plowed through M$ site descriptions, the Microsoft Security Resource
> Kit and Randy Franklin Smith’s Eventlog site)
>
>
>
> Feel free to post here, or if you like catch me offline, love to hear the
> feedback.  After this its on to Firewall rules accordingly for the servers
> and either scripting or GPOing that out for a baseline.
>
>
>
> Z
>
>
>
> Edward E. Ziots
>
> CISSP, Network +, Security +
>
> Network Engineer
>
> Lifespan Organization
>
> Email:ezi...@lifespan.org <email%3aezi...@lifespan.org>
>
> Cell:401-639-3505
>
>
>
>
>
>
>
>
> --
> "On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
> the machine wrong figures, will the right answers come out?' I am not able
> rightly to apprehend the kind of confusion of ideas that could provoke such
> a question."
>
>
>
>
>
>
>
>
>
>
>
>
>
>


-- 
"On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into
the machine wrong figures, will the right answers come out?' I am not able
rightly to apprehend the kind of confusion of ideas that could provoke such
a question."

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to