Auditing

3.3 Explain important concepts pertaining to identity and access management for server administration.

📘CompTIA Server+ (SK0-005)


What is Auditing?

Auditing is the process of tracking, recording, and reviewing activities that happen on a server or system.

It helps administrators:

  • Monitor user behavior
  • Detect unauthorized access
  • Investigate security incidents
  • Ensure compliance with policies and regulations

Auditing works by generating logs (records) of activities, which can later be reviewed.


Why Auditing is Important (Exam Focus)

You should understand that auditing is used for:

  • Security monitoring – Detect suspicious actions
  • Accountability – Know who did what and when
  • Compliance – Meet legal or organizational requirements
  • Troubleshooting – Identify causes of issues

Types of Auditing (Based on Exam Objectives)

1. User Activity Auditing

What it is

Tracking everything a user does on a system.

What is monitored

  • File access (read/write/delete)
  • Application usage
  • Configuration changes
  • Administrative actions

Example (IT environment)

An administrator checks logs to see:

  • Which user modified a configuration file
  • Who accessed a restricted directory

Why it matters

  • Detect insider threats
  • Identify misuse of privileges
  • Ensure users follow policies

2. Login Auditing

What it is

Tracking all login attempts to a system.

What is monitored

  • Successful logins
  • Failed login attempts
  • Login time and location (if available)
  • Remote vs local access

Example (IT environment)

A system log shows:

  • Multiple failed login attempts from the same account
  • A login at an unusual time

Why it matters

  • Detect brute-force attacks
  • Identify compromised accounts
  • Monitor unauthorized access attempts

Important Exam Point

  • Failed logins are especially important for detecting attacks

3. Group Membership Auditing

What it is

Tracking changes to user group memberships.

What is monitored

  • Users added to groups
  • Users removed from groups
  • Changes in privilege levels

Example (IT environment)

Logs show:

  • A user was added to the Administrators group
  • A user was removed from a restricted access group

Why it matters

  • Prevent privilege escalation
  • Ensure least privilege principle is followed
  • Detect unauthorized access rights changes

Important Exam Point

  • Changes to privileged groups must always be audited

4. Deletion Auditing

What it is

Tracking when objects are deleted from the system.

What is monitored

  • Deleted user accounts
  • Removed files or folders
  • Deleted logs or system objects

Example (IT environment)

Audit logs show:

  • A user account was deleted
  • Important system logs were removed

Why it matters

  • Detect malicious activity
  • Recover from accidental deletions
  • Maintain data integrity

Audit Logs

What are Audit Logs?

Audit logs are records of all tracked activities.

Common log details include:

  • Username
  • Event type (login, delete, modify)
  • Date and time
  • Source system or IP address
  • Success or failure status

Best Practices for Auditing (Exam Essentials)

1. Enable Proper Logging

  • Turn on auditing for critical systems
  • Focus on sensitive areas (logins, admin actions)

2. Review Logs Regularly

  • Do not just collect logs—analyze them
  • Look for unusual patterns

3. Use Centralized Logging

  • Store logs in a central system (e.g., SIEM)
  • Makes monitoring easier

4. Protect Logs

  • Restrict access to logs
  • Prevent tampering or deletion

5. Set Alerts

  • Configure alerts for:
    • Multiple failed logins
    • Privilege changes
    • Account deletions

Key Exam Concepts to Remember

  • Auditing = Tracking and reviewing system activity
  • User activity auditing tracks actions performed by users
  • Login auditing tracks access attempts (success and failure)
  • Group membership auditing tracks permission changes
  • Deletion auditing tracks removed objects
  • Logs must be:
    • Stored securely
    • Reviewed regularly

Quick Summary (For Revision)

  • Auditing helps in security, compliance, and troubleshooting
  • Focus on:
    • User actions
    • Login attempts
    • Permission changes
    • Deletions
  • Always monitor privileged activities
  • Logs are only useful if they are reviewed and protected
Buy Me a Coffee