Partager via


Audit SAM

Audit SAM, which enables you to audit events that are generated by attempts to access Security Account Manager (SAM) objects.

The Security Account Manager (SAM) is a database that is present on computers running Windows operating systems that stores user accounts and security descriptors for users on the local computer.

  • SAM objects include the following:

  • SAM_ALIAS: A local group

  • SAM_GROUP: A group that is not a local group

  • SAM_USER: A user account

  • SAM_DOMAIN: A domain

  • SAM_SERVER: A computer account

If you configure this policy setting, an audit event is generated when a SAM object is accessed. Success audits record successful attempts, and failure audits record unsuccessful attempts.

Only a SACL for SAM_SERVER can be modified.

Changes to user and group objects are tracked by the Account Management audit category. However, user accounts with enough privileges could potentially alter the files in which the account and password information is stored in the system, bypassing any Account Management events.

Event volume: High on domain controllers.

Computer Type General Success General Failure Stronger Success Stronger Failure Comments
Domain Controller - - - - There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at Security Account Manager level.
Member Server - - - - There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at Security Account Manager level.
Workstation - - - - There is no recommendation for this subcategory in this document, unless you know exactly what you need to monitor at Security Account Manager level.

Events List:

  • 4661(S, F): A handle to an object was requested.