CIFS Administration 7-29
(YHQW$XGLWLQJ2YHUYLHZ
'HVFULSWLRQ
This overview of how to audit events contains steps that are described in detail in
later sections.
6WHSV
To audit events, complete the following steps:
1. Enable CIFS access logging, as described in  Enabling CIFS Access Logging.
2. Set a system ACL on the files you want to audit, as described in Setting a Sys-
tem ACL on a File. This involves specifying the users or groups whose access to
the file you want to audit.
3. Use the Event Viewer, as described in Viewing Events in a Security Log. to
view the security log.
(QDEOLQJ&,)6$FFHVV/RJJLQJ
'HVFULSWLRQ
Use this procedure to enable CIFS access logging. You follow this procedure when
you want to start logging file access events by a specified user on a particular file.
After you complete this procedure, the filer is ready to process access logging
information.
6WHS
To enable CIFS access logging, enter the following command:
RSWLRQVFLIVDFFHVVBORJJLQJHQDEOHRQ
'LVDEOLQJ&,)6$FFHVV/RJJLQJ
'HVFULSWLRQ
Use this procedure to disable CIFS access logging. You follow this procedure when
you want to stop logging file access events and free the resources that are used by
access logging. After you complete this procedure, access logging stops.