From 2fe8daa86fdb0a55af97d86b8d9b68c2509913eb Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Sun, 14 Mar 2021 21:01:08 +0200 Subject: [PATCH 1/3] add note pointing to older article https://github.com/MicrosoftDocs/windows-itpro-docs/issues/9068 --- .../security/threat-protection/auditing/audit-file-system.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/auditing/audit-file-system.md b/windows/security/threat-protection/auditing/audit-file-system.md index 7da7e7d670..70075509ce 100644 --- a/windows/security/threat-protection/auditing/audit-file-system.md +++ b/windows/security/threat-protection/auditing/audit-file-system.md @@ -21,6 +21,8 @@ ms.technology: mde - Windows 10 - Windows Server 2016 +> [!NOTE] +> For more details about applicability on older operating system versions, check [this article](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn319068(v=ws.11)). Audit File System determines whether the operating system generates audit events when users attempt to access file system objects. From fc730dcd338a6d81ef87f92a3ca6f23ed1f15430 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 15 Mar 2021 09:04:56 +0200 Subject: [PATCH 2/3] Update windows/security/threat-protection/auditing/audit-file-system.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../security/threat-protection/auditing/audit-file-system.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/auditing/audit-file-system.md b/windows/security/threat-protection/auditing/audit-file-system.md index 70075509ce..6f4a85f583 100644 --- a/windows/security/threat-protection/auditing/audit-file-system.md +++ b/windows/security/threat-protection/auditing/audit-file-system.md @@ -22,7 +22,7 @@ ms.technology: mde - Windows Server 2016 > [!NOTE] -> For more details about applicability on older operating system versions, check [this article](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn319068(v=ws.11)). +> For more details about applicability on older operating system versions, read the article [Audit File System](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn319068(v=ws.11)). Audit File System determines whether the operating system generates audit events when users attempt to access file system objects. @@ -63,4 +63,3 @@ Only one event, “[4658](event-4658.md): The handle to an object was closed,” - [5051](event-5051.md)(-): A file was virtualized. - [4670](event-4670.md)(S): Permissions on an object were changed. - From 94d1d8b96bd76e7ca5fcfc4b0f9ef0ae25530500 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Mon, 15 Mar 2021 22:06:34 +0200 Subject: [PATCH 3/3] Update windows/security/threat-protection/auditing/audit-file-system.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- .../security/threat-protection/auditing/audit-file-system.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/auditing/audit-file-system.md b/windows/security/threat-protection/auditing/audit-file-system.md index 6f4a85f583..ef4138dc66 100644 --- a/windows/security/threat-protection/auditing/audit-file-system.md +++ b/windows/security/threat-protection/auditing/audit-file-system.md @@ -22,7 +22,7 @@ ms.technology: mde - Windows Server 2016 > [!NOTE] -> For more details about applicability on older operating system versions, read the article [Audit File System](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn319068(v=ws.11)). +> For more details about applicability on older operating system versions, read the article [Audit File System](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn319068(v=ws.11)). Audit File System determines whether the operating system generates audit events when users attempt to access file system objects.