Export (0) Print
Expand All

Auditpol resourceSACL

Published: April 17, 2012

Updated: April 17, 2012

Applies To: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012

Configures global resource system access control lists (SACLs).

noteNote
Applies only to Windows 7 and Windows Server 2008 R2.

For examples of how this command can be used, see Examples.

auditpol /resourceSACL
[/set /type:<resource> [/success] [/failure] /user:<user> [/access:<access flags>]]
[/remove /type:<resource> /user:<user> [/type:<resource>]]
[/clear [/type:<resource>]]
[/view [/user:<user>] [/type:<resource>]]

 

Parameter Description

/set

Adds a new entry to or updates an existing entry in the resource SACL for the resource type specified.

/remove

Removes all entries for the given user in the global object access auditing list.

/clear

Removes all entries from the global object access auditing list.

/view

Lists the global object access auditing entries in a resource SACL. The user and resource types are optional.

/?

Displays help at the command prompt.

 

Argument Description

/type

The resource for which object access auditing is being configured. The supported argument values are File (for directories and files) and Key (for registry keys).

noteNote
The file and key values are case-sensitive.

/success

Specifies success auditing.

/failure

Specifies failure auditing.

/user

Specifies a user in one of the following forms:

  • DomainName\Account (such as DOM\Administrators)

  • StandaloneServer\Group Account (see LookupAccountName function)

  • {S-1-x-x-x-x} (x is expressed in decimal, and the entire SID must be enclosed in curly braces); for example: {S-1-5-21-5624481-130208933-164394174-1001}

    noteNote
    If the SID form is used, no check is done to verify the existence of this account.

/access

Specifies a permission mask that can be specified in one of two forms:

  • A sequence of simple rights:

    • Generic access rights:

      • GA - GENERIC ALL

      • GR - GENERIC READ

      • GW - GENERIC WRITE

      • GX - GENERIC EXECUTE

    • Access rights for files:

      • FA - FILE ALL ACCESS

      • FR - FILE GENERIC READ

      • FW - FILE GENERIC WRITE

      • FX - FILE GENERIC EXECUTE

    • Access rights for registry keys:

      • KA - KEY ALL ACCESS

      • KR - KEY READ

      • KW - KEY WRITE

      • KX - KEY EXECUTE

    For example: '/access:FRFW' will enable audit events for read and write operations

  • A hexadecimal value representing the access mask (such as 0x1200a9)

    This is useful when using resource-specific bit masks that are not part of the security descriptor definition language (SDDL) standard. If omitted, Full access is used.

For resourceSACL operations, you must have Write or Full Control permission on that object set in the security descriptor. You can also perform resourceSACL operations by possessing the Manage auditing and security log (SeSecurityPrivilege) user right. However, this right allows additional access that is not necessary to perform the remove operation.

To set a global resource SACL to audit successful access attempts by a user on a registry key:

auditpol /resourceSACL /set /type:Key /user:MYDOMAIN\myuser /success

To set a global resource SACL to audit successful and failed attempts by a user to perform generic read and write functions on files or folders:

auditpol /resourceSACL /set /type:File /user:MYDOMAIN\myuser /success /failure /access:FRFW

To remove all global resource SACL entries for files or folders:

auditpol /resourceSACL /type:File /clear

To remove all global resource SACL entries for a particular user from files or folders:

auditpol /resourceSACL /remove /type:File /user:{S-1-5-21-56248481-1302087933-1644394174-1001}

To list the global object access auditing entries set on files or folders:

auditpol /resourceSACL /type:File /view

To list the global object access auditing entries for a particular user that are set on files or folders:

auditpol /resourceSACL /type:File /view /user:MYDOMAIN\myuser

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft