To set up an audit policy

1.Use the procedure provided earlier in this to set the audit policy you set up in Table 13-7 in a new GPO you create for the Domain Controllers OU called Domain Controllers Audit Policy.
Use Gpupdate to refresh Group Policy.
In this exercise, you configure a file for auditing.
To configure a file for auditing
1.In O.\ (where C is the name of your system drive), create a simple text file. Name the file Text.
2.Use the procedure provided earlier in this lesson to configure the Text file for auditing. Audit the success and failure for the Everyone group for each of the following events:
aCreate Files/Write Data
aDelete
aChange Permissions
aTake Ownership
3.Assign Read permission to the Everyone group for the Text file. Clear the check box Allow Inheritable Permissions From The Parent To Propagate To This Object And All Child Objects. Include These With Entries Explicitly Defined Here. Click Remove to confirm that you want to clear the check box Allow Inheritable Permissions From The Parent To Propagate To This Object And All Child Objects. Include These With Entries Explicitly Defined Here. Click OK.
Exercise 4: Configuring a Printer for Auditing
In this exercise, you configure a printer for auditing.
Important To complete this exercise, you need to mcitp enterprise administrator have a local printer installed on your computer. However, you do not need a printing device connected to the computer. If you do not have a local printer installed, create one now. A printing device refers to the physical machine that prints, and local printer refers to the software that Windows Server 2003 needs to send data to the printing device.
In this exercise, you plan an audit policy for your practice server.
To plan a domain audit policy
For the contoso.com practice domain, determine the following:
Which types of events to audit
Whether to audit the success or failure of an event, or both
Use the following criteria to make your decisions:
Record unsuccessful attempts to gain access to the network.
Record unauthorized access to the files that make up the Customer database.
For billing purposes, track color printer usage.
Track whenever someone tries to tamper with the server hardware.
Keep a record of actions that an administrator performs to track unauthorized changes.
Track backup procedures to prevent free exam papers data theft.
Track unauthorized access to sensitive Active Directory objects.

Processing your request, Please wait....