text stringlengths 0 4.23k |
|---|
Parameters |
Parameter |
Description |
/user |
Retrieves all users for whom the per-user audit policy has been defined. If used with the /v parameter, the security identifier (SID) of the user is also displayed. |
/category |
Displays the names of categories understood by the system. If used with the /v parameter, the category globally unique identifier (GUID) is also displayed. |
/subcategory |
Displays the names of subcategories and their associated GUID. |
/v |
Displays the GUID with the category or subcategory, or when used with /user, displays the SID of each user. |
/r |
Displays the output as a report in comma-separated value (CSV) format. |
/? |
Displays help at the command prompt. |
Examples |
To list all users who have a defined audit policy, type: |
auditpol /list /user |
To list all users who have a defined audit policy and their associated SID, type: |
auditpol /list /user /v |
To list all categories and subcategories in report format, type: |
auditpol /list /subcategory:* /r |
To list the subcategories of the detailed Tracking and DS Access categories, type: |
auditpol /list /subcategory:detailed Tracking,DS Access |
auditpol remove |
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012 |
The auditpol remove command removes the per-user audit policy for a specified account or all accounts. |
To perform remove operations on the per-user policy, you must have Write or Full Control permissions for that object set in the security descriptor. You can also perform remove operations if you have the Manage auditing and security log (SeSecurityPrivilege) user right. However, this right allows access that isn't necessary to perform the overall remove operations. |
SeSecurityPrivilege |
Syntax |
auditpol /remove [/user[:<username>|<{SID}>]] |
[/allusers] |
Parameters |
Parameter |
Description |
/user |
Specifies the security identifier (SID) or user name for the user for whom the per-user audit policy is to be deleted. |
/allusers |
Removes the per-user audit policy for all users. |
/? |
Displays help at the command prompt. |
Examples |
To remove the per-user audit policy for user mikedan by name, type: |
mikedan |
auditpol /remove /user:mikedan |
To remove the per-user audit policy for user mikedan by SID, type: |
mikedan |
auditpol /remove /user:{S-1-5-21-397123471-12346959} |
To remove the per-user audit policy for all users, type: |
auditpol /remove /allusers |
auditpol resourceSACL |
Applies to: Windows Server 2022, Windows Server 2019, Windows 7 and Windows Server 2008 R2 |
Configures global resource system access control lists (SACLs). |
To perform resourceSACL operations, you must have Write or Full Control permissions for that object set in the security descriptor. You can also perform resourceSACL operations if you have the Manage auditing and security log (SeSecurityPrivilege) user right. |
Syntax |
auditpol /resourceSACL |
[/set /type:<resource> [/success] [/failure] /user:<user> [/access:<access flags>]] |
[/remove /type:<resource> /user:<user> [/type:<resource>]] |
[/clear [/type:<resource>]] |
[/view [/user:<user>] [/type:<resource>]] |
Parameters |
Parameter |
Description |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.