Compartir a través de


Auditpol get

 

Applies To: Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8

Retrieves the system policy, per-user policy, auditing options, and audit security descriptor object.

For examples of how this command can be used, see Examples.

Syntax

Auditpol /get 
[/user[:<username>|<{sid}>]]
[/category:*|<name>|<{guid}>[,:<name|<{guid}>…]]
[/subcategory:*|<name>|<{guid}>[,:<name|<{guid}>…]]
[/option:<option name>]
[/sd]
[/r]

Parameters

Parameter

Description

/user

Displays the security principal for whom the per-user audit policy is queried. Either the /category or /subcategory parameter must be specified. The user may be specified as a security identifier (SID) or name. If no user account is specified, then the system audit policy is queried.

/category

One or more audit categories specified by globally unique identifier (GUID) or name. An asterisk (*) may be used to indicate that all audit categories should be queried.

/subcategory

One or more audit subcategories specified by GUID or name.

/sd

Retrieves the security descriptor used to delegate access to the audit policy.

/option

Retrieves the existing policy for the CrashOnAuditFail, FullPrivilegeAuditing, AuditBaseObjects, or AuditBaseDirectories options.

/r

Displays the output in report format, comma-separated value (CSV).

/?

Displays help at the command prompt.

Remarks

All categories and subcategories can be specified by the GUID or name enclosed by quotation marks. Users can be specified by SID or name.

For all get operations for the per-user policy and system policy, you must have Read permission on that object set in the security descriptor. You can also perform get operations by possessing the Manage auditing and security log (SeSecurityPrivilege) user right. However, this right allows additional access that is not necessary to perform the get operation.

Examples

Examples for the per-user audit policy

To retrieve the per-user audit policy for the Guest account and display the output for the System, Detailed Tracking, and Object Access categories, type:

Auditpol /get /user:{S-1-5-21-1443922412-3030960370-963420232-51} /category:"System","Detailed Tracking","Object Access"

Note

This command is useful in two scenarios. When monitoring a specific user account for suspicious activity, you can use the /get command to retrieve the results in specific categories by using an inclusion policy to enable additional auditing. Or, if audit settings on an account are logging numerous but superfluous events, you can use the /get command to filter out extraneous events for that account with an exclusion policy. For a list of all categories, use the auditpol /list /category command.

To retrieve the per-user audit policy for a category and a particular subcategory, which reports the inclusive and exclusive settings for that subcategory under the System category for the Guest account, type:

Auditpol /get /user:guest /category:"System" /subcategory:{0ccee921a-69ae-11d9-bed3-505054503030}

To display the output in report format and include the computer name, policy target, subcategory, subcategory GUID, inclusion settings, and exclusion settings, type:

Auditpol /get /user:guest /category:Detailed Tracking" /r

Examples for the system audit policy

To retrieve the policy for the System category and subcategories, which reports the category and subcategory policy settings for the system audit policy, type:

Auditpol /get /category:"System" /subcategory:{0ccee921a-69ae-11d9-bed3-505054503030}

To retrieve the policy for the Detailed Tracking category and subcategories in report format and include the computer name, policy target, subcategory, subcategory GUID, inclusion settings, and exclusion settings, type:

Auditpol /get /category:"Detailed Tracking" /r

To retrieve the policy for two categories with the categories specified as GUIDs, which reports all the audit policy settings of all the subcategories under two categories, type:

Auditpol /get /category:{69979849-797a-11d9-bed3-505054503030},{69997984a-797a-11d9-bed3-505054503030} subcategory:{0ccee921a-69ae-11d9-bed3-505054503030}

Examples for auditing options

To retrieve the state, either enabled or disabled, of the AuditBaseObjects option, type:

Auditpol /get /option:AuditBaseObjects

Note

The available options are AuditBaseObjects, AuditBaseOperations, and FullPrivilegeAuditing.

To retrieve the state—enabled, disabled, or 2—of the CrashOnAuditFail option, type:

Auditpol /get /option:CrashOnAuditFail /r

Additional references

Command-Line Syntax Key