25
621
System access was granted to an account.
622
System access was removed from an account.
623
Auditing policy was set on a per-user basis
625
Auditing policy was refreshed on a per-user basis.
768
A collision was detected between a namespace element in one forest and a
namespace element in another forest.
Note:
When a namespace element in one forest
overlaps a namespace element in another forest, it can lead to ambiguity in resolving
a name belonging to one of the namespace elements. This overlap is also called a
collision. Not all parameters are valid for each entry type. For example, fields such as
DNS name, NetBIOS name, and SID are not valid for an entry of type
’TopLevelName.’
769
Trusted forest information was added.
Note:
This event message is generated when forest trust information is updated and
one or more entries are added. One event message is generated for each added,
deleted, or modified entry. If multiple entries are added, deleted, or modified in a
single update of the forest trust information, all the generated event messages are
assigned a single unique identifier called an operation ID. This allows administrators
to determine if the multiple generated event messages are the result of a single
operation. Not all parameters are valid for each entry type. For example, parameters
such as DNS name, NetBIOS name and SID are not valid for an entry of type
“TopLevelName.”
770
Trusted forest information was deleted.
Note:
See event description for event 769.
771
Trusted forest information was modified.
Note:
See event description for event 769.
805
The event log service read the security log configuration for a session.
Audit Privilege Use
Member Server Default
Legacy Client
Enterprise Client
High Security Client
No Auditing
No Auditing
Failure
Success Failure
The
Audit privilege use
setting determines whether to audit each instance of a user exercising a user
right. Configuring this value to
Success
generates an audit entry each time that a user right is
exercised successfully. Configuring this value to
Failure
generates an audit entry each time that a user
right is exercised unsuccessfully. Audits are not generated when the following user rights are
exercised, even if the
Audit privilege use
settings is configured to
Success
or
Failure
. This is because
auditing these user rights generates many events in the security log, which may constrain the
performance of the NAS and other server systems. To audit the following excluded rights,
administrators must enable the
Audit: Audit the use of Backup and Restore
privilege
security option in
Group Policy:
•
Bypass traverse checking
•
Debug programs
•
Create a token object
•
Replace process level token