Audit object access This security setting determines whether the OS audits user attempts to access non-Active Directory objects. Audit is only generated for objects that have system access control lists (SACL) specified, and only if the type of access requested (such as Write, Read, or Modify) and the account making the request match the settings in the SACL. The administrator can specify whether to audit only successes, only failures, both successes and failures, or to not audit these events at all (i.e. neither successes nor failures). If Success auditing is enabled, an audit entry is generated each time any account successfully accesses a non-Directory object that has a matching SACL specified. If Failure auditing is enabled, an audit entry is generated each time any user unsuccessfully attempts to access a non-Directory object that has a matching SACL specified. Note that you can set a SACL on a file system object using the Security tab in that object's Properties dialog box. Default: No auditing. Important: For more control over auditing policies, use the settings in the Advanced Audit Policy Configuration node. For more information about Advanced Audit Policy Configuration, see http://go.microsoft.com/fwlink/?LinkId=140969.
Audit account management This security setting determines whether to audit each event of account management on a computer. ...
Audit directory service access This security setting determines whether the OS audits user attempts to access Active Directory ...
Audit file system global object access This policy setting allows you to apply a comprehensive object access audit policy ...
Audit logon events This security setting determines whether the OS audits each instance of a user attempting to log on to ...
Audit object access This security setting determines whether the OS audits user attempts to access non-Active Directory objects. ...
Audit policy change This security setting determines whether the OS audits each instance of attempts to change user rights ...
Audit Policy Change: New Policy: Success Failure %3 %4 Logon/Logoff %5 %6 Object Access %7 %8 Privilege Use %13 %14 Account ...
Audit privilege use This security setting determines whether to audit each instance of a user exercising a user right. If ...
Audit process tracking This security setting determines whether the OS audits process-related events such as process creation, ...