mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Fix for links
This commit is contained in:
parent
9e7d114415
commit
e1399ddf52
@ -836,7 +836,7 @@ Volume: Low.
|
|||||||
|
|
||||||
<!-- AccountLogonLogoff_AuditSpecialLogon-Description-Begin -->
|
<!-- AccountLogonLogoff_AuditSpecialLogon-Description-Begin -->
|
||||||
<!-- Description-Source-DDF -->
|
<!-- Description-Source-DDF -->
|
||||||
This policy setting allows you to audit events generated by special logons such as the following : The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see article 947223 in the Microsoft Knowledge Base (<https://go.microsoft.com/fwlink/?LinkId=121697)>.
|
This policy setting allows you to audit events generated by special logons such as the following : The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see article 947223 in the Microsoft Knowledge Base (<https://go.microsoft.com/fwlink/?LinkId=121697>).
|
||||||
<!-- AccountLogonLogoff_AuditSpecialLogon-Description-End -->
|
<!-- AccountLogonLogoff_AuditSpecialLogon-Description-End -->
|
||||||
|
|
||||||
<!-- AccountLogonLogoff_AuditSpecialLogon-Editable-Begin -->
|
<!-- AccountLogonLogoff_AuditSpecialLogon-Editable-Begin -->
|
||||||
@ -2266,7 +2266,7 @@ Volume: High on a file server or domain controller because of SYSVOL network acc
|
|||||||
|
|
||||||
<!-- ObjectAccess_AuditFileSystem-Description-Begin -->
|
<!-- ObjectAccess_AuditFileSystem-Description-Begin -->
|
||||||
<!-- Description-Source-DDF -->
|
<!-- Description-Source-DDF -->
|
||||||
This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see https//go.microsoft.com/fwlink/?LinkId=122083. If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
|
This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see <https//go.microsoft.com/fwlink/?LinkId=122083>. If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
|
||||||
- If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL.
|
- If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
@ -2774,7 +2774,7 @@ This policy setting allows you to audit events generated by attempts to access t
|
|||||||
- If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made.
|
- If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Only the System Access Control List (SACL) for SAM_SERVER can be modified. Volume High on domain controllers. For information about reducing the amount of events generated in this subcategory, see article 841001 in the Microsoft Knowledge Base (https//go.microsoft.com/fwlink/?LinkId=121698).
|
> Only the System Access Control List (SACL) for SAM_SERVER can be modified. Volume High on domain controllers. For information about reducing the amount of events generated in this subcategory, see article 841001 in the Microsoft Knowledge Base (<https//go.microsoft.com/fwlink/?LinkId=121698>).
|
||||||
<!-- ObjectAccess_AuditSAM-Description-End -->
|
<!-- ObjectAccess_AuditSAM-Description-End -->
|
||||||
|
|
||||||
<!-- ObjectAccess_AuditSAM-Editable-Begin -->
|
<!-- ObjectAccess_AuditSAM-Editable-Begin -->
|
||||||
|
Loading…
x
Reference in New Issue
Block a user