Lisa Bock stresses to carefully select what you want to audit. You can audit nearly everything, however, it would not be a good idea to log everything, as logging, in general, consumes resources and the security log can become large and difficult to manage.
- [Instructor] Auditing allows the administrator … the ability to track users or processes … and what they accessed or tried to access. … To give you a better idea of the types of auditing … that can take place, I'm here in Windows 10, … and I've opened the local security policy. … Now I'll go to local policies, … and we'll drop down and open the audit policy. … Now once we get into here, … we'll double click and here we can say audit these attempts. … Well we'll say success and failure. … Now if you're really not sure what it does, … you can go to explain and in this case it says … this security setting determines … whether the operating system audits each instance … of a user attempting to logon of to logoff of this computer. … We'll go back and say apply and then okay … and now that's going to be audited. … Now there are others as you can see. … Policy change, audit privilege use, and audit system events. … Planning is a critical step in the auditing process. … All and any activity on a system can be logged, …
- Define “passphrase.”
- Recall the purpose of multifactor authentication.
- Identify the tool used in today’s Windows operating systems to secure the file system.
- Explain what happens when a file is moved into a folder with permissions.
- Name the authentication protocol used in Active Directory.
- Recognize the location of the audit logs.
- Summarize the purpose of hardening.
- Explain the purpose of cryptographic techniques.
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 35m Beginner
IT Security: Key Policies and Resourceswith Gregory Michaelidis23m 44s Intermediate
1. Understand User Authentication
2. Understand Permissions
3. Dissecting Audit Policies
4. Server Protection
5. Providing email protection
6. Understand Encryption
Next steps1m 3s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.