mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
acrolinx fixes
This commit is contained in:
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit User/Device Claims (Windows 10)
|
title: Audit User/Device Claims (Windows 10)
|
||||||
description: Audit User/Device Claims is an audit policy setting which enables you to audit security events that are generated by user and device claims.
|
description: Audit User/Device Claims is an audit policy setting that enables you to audit security events that are generated by user and device claims.
|
||||||
ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486
|
ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -25,7 +25,7 @@ Audit User/Device Claims allows you to audit user and device claims information
|
|||||||
|
|
||||||
For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
|
For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
|
||||||
|
|
||||||
***Important***: [Audit Logon](audit-logon.md) subcategory must also be enabled in order to get events from this subcategory.
|
***Important***: Enable the [Audit Logon](audit-logon.md) subcategory in order to get events from this subcategory.
|
||||||
|
|
||||||
**Event volume**:
|
**Event volume**:
|
||||||
|
|
||||||
|
@ -13,7 +13,7 @@ manager: dansimp
|
|||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# 1105(S): Event log automatic backup.
|
# 1105(S): Event log automatic backup
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
@ -71,7 +71,7 @@ This event generates, for example, if the maximum size of Security Event Log fil
|
|||||||
|
|
||||||
***Field Descriptions:***
|
***Field Descriptions:***
|
||||||
|
|
||||||
**Log** \[Type = UnicodeString\]: the name of the log which was archived (new event log file was created and previous event log was archived). Always “**Security”** for Security Event Logs.
|
**Log** \[Type = UnicodeString\]: the name of the log that was archived (new event log file was created and previous event log was archived). Always “**Security”** for Security Event Logs.
|
||||||
|
|
||||||
**File**: \[Type = FILETIME\]: full path and filename of archived log file.
|
**File**: \[Type = FILETIME\]: full path and filename of archived log file.
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ Account must have **SeAuditPrivilege** (Generate security audits) to be able to
|
|||||||
|
|
||||||
- Only **OrgEventID**, **ComputerName**, and **EventCount** are required—others are optional. Fields not specified appear with “**-**“ in the event description field.
|
- Only **OrgEventID**, **ComputerName**, and **EventCount** are required—others are optional. Fields not specified appear with “**-**“ in the event description field.
|
||||||
|
|
||||||
- If a field doesn’t match the expected data type, the event is not generated. (i.e., if **EventCount** = “XYZ” then no event is generated.)
|
- If a field doesn’t match the expected data type, the event is not generated. That is, if **EventCount** = “XYZ”, then no event is generated.
|
||||||
|
|
||||||
- **UserSid**, **UserName**, and **UserDomain** are not related to each other (think **SubjectUser** fields, where they are)
|
- **UserSid**, **UserName**, and **UserDomain** are not related to each other (think **SubjectUser** fields, where they are)
|
||||||
|
|
||||||
@ -98,5 +98,5 @@ Account must have **SeAuditPrivilege** (Generate security audits) to be able to
|
|||||||
|
|
||||||
For 4618(S): A monitored security event pattern has occurred.
|
For 4618(S): A monitored security event pattern has occurred.
|
||||||
|
|
||||||
- This event can be invoked only manually/intentionally, it is up to you how interpret this event depends on information you put inside of it.
|
- This event can be invoked only manually/intentionally, it is up to you how to interpret this event depends on information you put inside of it.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user