Join Martin Guidry for an in-depth discussion in this video Using Group Policy to audit actions in Window 10, part of Securing Windows 10.
- View Offline
- [Voiceover] In this section,…we're going to talk about using group policy…to audit some of the events…that happen on a Windows 10 computer.…So again, I'm in the local group policy editor.…Under Computer Configuration,…I'll open up Windows Settings.…Then open Security Settings.…Then open Local Policies,…and in there I'll click on Audit Policy.…The top one is Audit Account Logon Events.…And that is something that might be interesting to me…so I'll double click on it.…
And I'll see that I can audit…either success and or failure.…So I'll click both of those check boxes.…The success events may not be that interesting…but certainly the failure is.…If someone who shouldn't be trying to login to my computer…does try and they fail,…I would like to know about that.…So I would like to audit account logon failure events.…I'll click apply here, and then okay.…The other one I want to look at is object access.…
And I'll double click on that.…And again, I have the options for success or failure.…And for now, I'm gonna click on both of them.…
In this course, Martin Guidry helps you work through each essential security step. He takes you through familiar ground, standard account setup, covering accounts, passwords, users groups, and permissions. He also takes you through unfamiliar territory, enhanced features and new products, examining BitLocker, Wi-Fi Sense, Windows Defender, and Edge, the new web browser. This course provides instructional step-by-step walkthroughs in addition to best practice discussions. Learn how to protect your computer from a network attack, apply security policies in Group Policy, use remote desktop, and more.
- Setting up passwords, smart cards, and biometrics
- Creating groups and assigning permissions
- Assigning permissions
- Encrypting full discs, file transfers, and networks
- Using anti-virus and anti-malware solutions
- Configuring firewall settings
- Securing remote desktop connections