Programming4us
         
 
 
Applications Server

Active Directory Domain Services 2008: Enable the Directory Service Changes Auditing Subcategory

11/26/2010 5:37:15 PM
Enable the Directory Service Changes auditing subcategory.

To enable the Directory Service Changes auditing subcategory, perform the following steps:

1.
Log on to a domain controller.

2.
Click Start, and then click Command Prompt.

3.
To enable the auditing of successful attempts, in the Command Prompt window, type the following command, as shown in Figure 1, and then press Enter:

auditpol /set /subcategory:"directory service changes"
/success:enable



Figure 1. Enabling the Directory Service Changes auditing subcategory.


4.
To enable the auditing of failed attempts, in the Command Prompt window, type the following command, as shown in Figure 1, and then press Enter:

auditpol /set /subcategory:"directory service changes"
/failure:enable

Other -----------------
- Active Directory Domain Services 2008: Disable the Directory Service Access Auditing Subcategory
- Active Directory Domain Services 2008: Enable the Directory Service Access Auditing Subcategory
- Active Directory Domain Services 2008: Retrieve the State of Directory Service Access Auditing Subcategories
- Exchange 2010 : Managing Exchange Recipients (part 4)
- Exchange 2010 : Managing Exchange Recipients (part 3)
- Exchange 2010 : Managing Exchange Recipients (part 2)
- Exchange 2010 : Managing Exchange Recipients (part 1)
- Exchange Server 2010 : Designing and Implementing Personal Archives
- Exchange Server 2010 : Designing and Implementing Message Journaling
- Exchange Server 2010 : Designing and Implementing Transport Rules
 
 
Most View
- Windows Remote Assistance : Troubleshoot From Afar
- Windows Phone7: Adding a Picture or Ringtone to a Contact
- Windows Phone 7 : Taking a Quick Tour (part 1)
- Exchange Server 2010 : Managing Address Lists
- Windows Server 2008 Server Core : Getting System Configuration Information with the SystemInfo Utility
- User-Level Security : Authorization and Impersonation (part 3) - Security Token Authentication
- Scripting Windows 7 with WSH : Programming the WshShell Object (part 2)
- Coding JavaScript for Mobile Browsers (part 12) - Swipe gesture
- Managing SQL Server Permissions (part 2) - Using SSMS to Manage Permissions at the Database Level
- Sharepoint 2010 : Backup and Restore (part 1) - Recycle Bin settings in Central Administration
Top 10
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 3) - Configuring Recipient Filtering
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 2)
- Implementing Edge Services for an Exchange Server 2007 Environment : Utilizing the Basic Sender and Recipient Connection Filters (part 1)
- Implementing Edge Services for an Exchange Server 2007 Environment : Installing and Configuring the Edge Transport Server Components
- What's New in SharePoint 2013 (part 7) - BCS
- What's New in SharePoint 2013 (part 6) - SEARCH
- What's New in SharePoint 2013 (part 6) - WEB CONTENT MANAGEMENT
- What's New in SharePoint 2013 (part 5) - ENTERPRISE CONTENT MANAGEMENT
- What's New in SharePoint 2013 (part 4) - WORKFLOWS
- What's New in SharePoint 2013 (part 3) - REMOTE EVENTS