Event 560, 562 When No Objects Have Been Selected for Auditing (149401)



The information in this article applies to:

  • Microsoft Windows NT Workstation 3.5
  • Microsoft Windows NT Workstation 3.51
  • Microsoft Windows NT Workstation 4.0
  • Microsoft Windows NT Server 3.5
  • Microsoft Windows NT Server 3.51
  • Microsoft Windows NT Server 4.0

This article was previously published under Q149401

SYMPTOMS

If you choose Audit on the Policies menu and enable the Auditing File and Objects Access option in User Manager for Domains without specifying any objects to be audited, event 560 and event 562 will be logged in the security log file. Any action performed by the Administrator account in User Manager for Domains (or Server Manager) will be logged as an event 560 for the Administrator account and as an event 562 for the System account.

CAUSE

By default, the Auditing File and Objects Access option audits all action performed in User Manager for Domains (and in Server Manager).

RESOLUTION

This is by design. Security Account Manager (SAM), by default, assigns security access control lists (SACLs) to all objects it creates, and managing them with User Manager causes an object access audit to occur.

Modification Type:MajorLast Reviewed:5/7/2003
Keywords:kbnetwork KB149401