Article ID: 112156, created on Jun 25, 2013, last review on Jun 25, 2013

  • Applies to:
  • Plesk 12.0 for Windows


Security configuration and events audits fall out of scope of Parallels Support and should be performed by your company's Security Administrator.
However, there are some recommendations for Microsoft Windows built-in tools that will allow you to perform audits on files and folders and protect your server from unauthorized use.

In some cases it is necessary to know who modified or deleted a file or folder and when. Microsoft Windows allows you to monitor several event types for security purposes.

This article describes how to set up a files audit on a Windows 2008 R2 server and how to obtain log data.

  1. Enable Audit process tracking for Success and Failure results:
    1. Open Start -> Run.
    2. Type secpol.msc and hit Enter.
    3. Navigate to Security Setting -> Local Policies -> Audit Policy.
    4. Edit Audit process tracking key and enable both Success and Failure events auditing.

    Resulting settings should look similar to this picture:

  2. Propagate policy changes:
    1. Open Start -> Run.
    2. Type in gpupdate /force and hit Enter.
  3. Set up auditing on required files and folders for needed event types:
    1. Open Windows Explorer and navigate to the file (folder) in question.
    2. Right-click the file and call Advanced menu on Security tab of the file's Properties.
    3. Switch to the Auditing tab and hit the Edit button.
    4. Click Add to choose users and groups for monitoring. The common practice is to add Authenticated Users group.
    5. Select checkboxes on required events for both Success and Failure in Auditing Entry. For an explicit audit, select all checkboxes.

    Resulting settings should look similar to this picture:

Now all access attempts will be tracked in the Security log of Event Viewer. If the Security Administrator wants to check whether the file was accessed or not, the simplest way is to export the Event Viewer Security log to text or a HTML file and find the corresponding logon and access events:
  1. Export Security log from Event Viewer:
    1. Open Start -> Run.
    2. Type in the below line and hit Enter:
    wmic ntevent where log='Security' get LogFile, SourceName, EventType,Message, TimeGenerated /format:htable > C:\SecurityLog.htm
  2. Find the corresponding log entries in the resulting HTML file:
    1. Open the resulting HTML in your web browser.
    2. Open context search with Ctrl+F.
    3. Search for the required file name to find out what access attempts have been made.
    4. In this example, we found that FileToTrackAccess.txt was opened with notepad.exe

    Once found, remember the Logon ID to find the IP address from where the user was logged in.
  3. Find the corresponding login event in the HTML file using the Logon ID from the previous step:

    As seen in the picture, notepad.exe edits were performed by the user Administrator who logged on remotely from IP

NOTE: This procedure may not work as expected if the server is the member of an Active Directory domain with group policies assigned. Consult with your network administrator if needed to clarify this aspect.

Additional information

The above steps represent one of many possible ways to audit access to files and folders on your server.
It is suggested that you provide this information to your company's Security Administrator to perform the task more efficiently.

Additional sources:

85a92ca67f2200d36506862eaa6ed6b8 a914db3fdc7a53ddcfd1b2db8f5a1b9c 56797cefb1efc9130f7c48a7d1db0f0c ed7be2b984f9c27de1d2dc349dc19c6d a766cea0c28e23e978fa78ef81918ab8

Email subscription for changes to this article