• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Windows event log configuration"

Collapse

  • woohoo
    replied
    Originally posted by DallasDad View Post
    And when you get tired of wading through the logs looking for that one off event try elex

    Windows event log management software, monitor system, application and security event logs — FSPro Labs

    It is bloody marvelous at filtering and exporting just the bits that matter often across multiple machines
    Only one thing to bear in mind if you want to enumerate account ids don't run it off line against saved logs

    I can't describe how useful this tool was to me auditing specific user access on dozens of believed redundant servers last year
    Thanks for this link I will take a look, just to add another useful tool - Log Parser Studio
    https://gallery.technet.microsoft.co...tudio-cd458765

    Leave a comment:


  • LondonManc
    replied
    You've not been asked to look at it by Paul from Microsoft Security Team have you?

    Leave a comment:


  • DallasDad
    replied
    And when you get tired of wading through the logs looking for that one off event try elex

    Windows event log management software, monitor system, application and security event logs — FSPro Labs

    It is bloody marvelous at filtering and exporting just the bits that matter often across multiple machines
    Only one thing to bear in mind if you want to enumerate account ids don't run it off line against saved logs

    I can't describe how useful this tool was to me auditing specific user access on dozens of believed redundant servers last year

    Leave a comment:


  • DaveB
    replied
    Cheers both

    Leave a comment:


  • Boney M
    replied
    There you go How to Configure Auditing for Privilege Elevation - Windows 7 Tutorial

    Leave a comment:


  • Boney M
    replied
    Originally posted by DaveB View Post
    I'm getting seriously rusty on the technical aspects of Windows these days.

    Does anyone know if the following are available to record as events?

    - Use of "Run as Administrator"

    - Provision of Administrator credentials when prompted by the OS
    Yes they are. There are 3 tokens as I remember depending on the elevation and if it was Run as Admin, Run with credentials and run with no UAC. Cannot remember the event ID's but a quick google you should fine them.

    Leave a comment:


  • DaveB
    started a topic Windows event log configuration

    Windows event log configuration

    I'm getting seriously rusty on the technical aspects of Windows these days.

    Does anyone know if the following are available to record as events?

    - Use of "Run as Administrator"

    - Provision of Administrator credentials when prompted by the OS

Working...
X