This allows an attacker to try to hack your accounts for as long as it takes to break in. There are a few ways to protect against this that I am going to go over in my next article about the Account Lockout policy. But first, it is important to turn on this account auditing so that you can see who may be trying to break into your accounts. After you have adjusted the auditing security policy, you will be able to see any account attacks including the account that they tried to logon with and where the request came from.
Let's get started and turn on audition for failed logon events:
1. Click on the Start Button and key in secpol.msc in the box and hit Enter.
2. Navigate through Local Policies and Audit Policy.
3. Right click on Audit account logon events policy and select Properties.
4. Check the Failure box and hit OK.
5. Right click on Audit logon events policy and select Properties.
6. Check the Failure box and hit OK. Your screen should now look like the figure below:
7. Close Local Security Policy editor.
Your computer has now been configured to log all failed user account logon attempts.
Once you have turned on account auditing, you can view the logs in Event Viewer (run eventvwr.msc) under Windows Logs and Security.
0 comments:
Post a Comment