Event Viewer Best practices

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

Best practices

Enable security logging for security-critical objects and actions, and then periodically review the security logs on computers in your network.

  • By setting up an auditing policy and reviewing your security logs, you can detect unauthorized activity or intrusion attempts by malicious users or attackers on computers in your network.

  • For more information about setting auditing policies, see Auditing Security Events.

  • For more information about viewing event logs, see View Event Logs.