Export (0) Print
Expand All
5 out of 10 rated this helpful - Rate this topic

Audit File Share

Updated: June 15, 2009

Applies To: Windows 7, Windows Server 2008 R2

This security policy setting determines whether the operating system generates audit events when a file share is accessed.

Audit events are not generated when shares are created, deleted, or when share permissions change.

noteNote
There are no system access control lists (SACLs) for shares; therefore, once this setting is enabled, access to all shares on the system will be audited.

Combined with File System auditing, File Share auditing allows you to track what content was accessed, the source (IP address and port) of the request, and the user account used for the access.

Event volume: High on a file server or domain controller (due to SYSVOL access by client computers for policy processing)

Default: Not configured

If this policy setting is configured, the following events are generated. The events appear on computers running Windows Server 2008 R2 or Windows 7, unless otherwise noted.

 

Event ID Event message

5140

A network share object was accessed.

noteNote
This event is logged on computers running Windows Server 2008 R2, Windows Server 2008, Windows 7, or Windows Vista.

5142

A network share object was added.

5143

A network share object was modified.

5144

A network share object was deleted.

5168

SPN check for SMB/SMB2 failed.

Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft. All rights reserved.