Configuring Auditing in SharePoint 2010
Configuring Auditing in SharePoint 2010
Auditing comes out of the box in SharePoint 2010. Although there is nothing to prevent you from doing so, auditing is not the tool to use to track what users are doing to satisfy curiosity. Auditing is something you do because you have to. It is something you are required to do in order to be compliant with a law, or standard, or some business rule. As long as we understand what we are required to audit, it's so easy to set up, even the fictional character The Mangler would do it, and he isn't one to want to comply with anything.
If you are interested in seeing how people are using your site collections and or sites, the built in Web Analytics tools are awesome in SharePoint 2010 and should give you everything you need there.
Auditing can be configured for a site collection, a list or library, or based on a content type as part of an organizations information management policy.
There are of course a few ways of going about this but I'm going to keep it simple.
In this blog I have created a site collection and based it on the Team Site template. I will configure auditing on the Shared Documents library.
I will configure auditing on the following:
- Opening or downloading documents, viewing items in lists, or viewing item properties.
- Editing Items
- Checking out or checking in items
- Moving or copying items to another location in the site
- Deleting or restoring items.
You will have to be a Site Collection Administrator in order to complete all the tasks in this blog.
I click on Library > Library Settings in the Shared Documents document library.
I click on Information management policy settings
I click on Document since that's what I'm auditing.
I select the checkbox next to Enable Auditing
Select Events to Audit
I select the events to audit by checking the box next to them. In this case I check all of them and then I click OK.
I verify the fact that Document has a Custom policy attached to it.
I added a bunch of documents to the Shared Documents Library, checked some out, deleted some, and restored them so now I'll check the audit log reports to make sure it's working. To do this I'll go Site Actions>Site Settings
Audit Log Reports
I click on Audit Log Reports in the Site Collection Administration section.
I can choose any of the reports that I want but if there is no data I will get an error saying there is not data. Since I know that I deleted and restored some items I'll choose Deletion.
I'll save this report to the Shared Documents Library, however in production this is where I create a document library with unique permissions so only Site Collection Administrators can see the contents. I click on Browse.
I select Shared Documents and click OK.
I click OK
I click to view the report.
the Big What Moment
I see a summary of my actions. The really important information however is in the Report Data Worksheet Tab so I click that at the bottom of the workbook.
This is the report data that can be tied into IIS logs and supply any required information.
There is much more to auditing but this is a good start. It's boring but it works.
You May Also Like
In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365. For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365
In this SharePoint training video, I want to talk about the Navigation Controls in SharePoint. They tend to fall into two kind of different categories; one with the navigation controls in a typical Collaboration Site such as a Team Site or a Project Site. These are Sites that are based on the Team Site Template … Continue reading Using Navigation Controls in a Collaboration Site in SharePoint
How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015