Finding who opened a file in the windows audit is straightforward.
How to audit windows server.
Windows provides a tool for pulling security logs from servers running windows server to a centralized location in order to simplify security auditing and log analysis audit collection services acs.
This section addresses the windows default audit policy settings baseline recommended audit policy settings and the more aggressive recommendations from microsoft for workstation and server products.
In the advanced security settings dialog box select the auditing tab and then select continue.
Simply look for event id 4663.
Windows server 2016 windows server 2012 r2 windows server 2012 windows 10 windows 8 1 windows 7.
Select and hold or right click the file or folder that you want to audit select properties and then select the security tab.
We can see the audit success event from when the administrator user accessed the test folder on the desktop it s working as expected.
Double click the configuration item named.
Read on to learn more about different auditing situations including who read edited or deleted a given file.
How to track who read a file on windows file server.
If failure auditing is enabled an audit entry is generated each time the os attempts and fails to perform one of these activities.
Through group policy for domains sites and organizational units local security policy for single servers configure audit settings for file and folders.
Enable file and folder auditing which can be done in two ways.
You can learn how to properly configure windows server auditing by reading audit policy best practices.
Filetotrackaccess txt at the details of the found audit registry look for the logon id and remember it.
These were all about how to configure audit policy in windows server 2016 or any other version of windows servers.
Windows file system auditing scenarios.
To apply or modify auditing policy settings for a local file or folder.
Select the security section.
On windows server 2012 auditing file and folder accesses consists of two parts.
This article will cover the process of.
On the right side click on search and type the filename that should be audit in this example.
Computer configuration policies windows settings security settings local policies audit policy on the right the list of available configuration options will be presented.
Do one of the following.