The Win32_SecuritySettingAuditing abstract, association WMI class specifies the auditing for a given trustee on a given object. This class is modeled after EXPLICIT_ACCESS.
Methods
Win32_SecuritySettingAuditing has no methods.
Properties
Win32_SecuritySettingAuditing returns 7 properties:
'AuditedAccessMask','GuidInheritedObjectType','GuidObjectType','Inheritance',
'SecuritySetting','Trustee','Type'
Unless explicitly marked as writeable, all properties are read-only. Read all properties for all instances:
Get-CimInstance -ClassName Win32_SecuritySettingAuditing -Property *
Most WMI classes return one or more instances.
When
Get-CimInstance
returns no result, then apparently no instances of class Win32_SecuritySettingAuditing exist. This is normal behavior.Either the class is not implemented on your system (may be deprecated or due to missing drivers, i.e. CIM_VideoControllerResolution), or there are simply no physical representations of this class currently available (i.e. Win32_TapeDrive).
AuditedAccessMask
Bit flags specifying what activities are audited.
AuditedAccessMask returns a numeric value. To translate it into a meaningful text, use any of the following approaches:
Use a PowerShell Hashtable
$AuditedAccessMask_map = @{
0 = 'FILE_LIST_DIRECTORY'
1 = 'FILE_ADD_FILE'
2 = 'FILE_ADD_SUBDIRECTORY'
3 = 'FILE_READ_EA'
4 = 'FILE_WRITE_EA'
5 = 'FILE_TRAVERSE'
6 = 'FILE_DELETE_CHILD'
7 = 'FILE_READ_ATTRIBUTES'
8 = 'FILE_WRITE_ATTRIBUTES'
16 = 'DELETE'
17 = 'READ_CONTROL'
18 = 'WRITE_DAC'
19 = 'WRITE_OWNER'
20 = 'SYNCHRONIZE'
}
Use a switch statement
switch([int]$value)
{
0 {'FILE_LIST_DIRECTORY'}
1 {'FILE_ADD_FILE'}
2 {'FILE_ADD_SUBDIRECTORY'}
3 {'FILE_READ_EA'}
4 {'FILE_WRITE_EA'}
5 {'FILE_TRAVERSE'}
6 {'FILE_DELETE_CHILD'}
7 {'FILE_READ_ATTRIBUTES'}
8 {'FILE_WRITE_ATTRIBUTES'}
16 {'DELETE'}
17 {'READ_CONTROL'}
18 {'WRITE_DAC'}
19 {'WRITE_OWNER'}
20 {'SYNCHRONIZE'}
default {"$value"}
}
Use Enum structure
Enum EnumAuditedAccessMask
{
FILE_LIST_DIRECTORY = 0
FILE_ADD_FILE = 1
FILE_ADD_SUBDIRECTORY = 2
FILE_READ_EA = 3
FILE_WRITE_EA = 4
FILE_TRAVERSE = 5
FILE_DELETE_CHILD = 6
FILE_READ_ATTRIBUTES = 7
FILE_WRITE_ATTRIBUTES = 8
DELETE = 16
READ_CONTROL = 17
WRITE_DAC = 18
WRITE_OWNER = 19
SYNCHRONIZE = 20
}
Examples
Use $AuditedAccessMask_map in a calculated property for Select-Object
<#
this example uses a hashtable to translate raw numeric values for
property "AuditedAccessMask" to friendly text
Note: to use other properties than "AuditedAccessMask", look up the appropriate
translation hashtable for the property you would like to use instead.
#>
#region define hashtable to translate raw values to friendly text
# Please note: this hashtable is specific for property "AuditedAccessMask"
# to translate other properties, use their translation table instead
$AuditedAccessMask_map = @{
0 = 'FILE_LIST_DIRECTORY'
1 = 'FILE_ADD_FILE'
2 = 'FILE_ADD_SUBDIRECTORY'
3 = 'FILE_READ_EA'
4 = 'FILE_WRITE_EA'
5 = 'FILE_TRAVERSE'
6 = 'FILE_DELETE_CHILD'
7 = 'FILE_READ_ATTRIBUTES'
8 = 'FILE_WRITE_ATTRIBUTES'
16 = 'DELETE'
17 = 'READ_CONTROL'
18 = 'WRITE_DAC'
19 = 'WRITE_OWNER'
20 = 'SYNCHRONIZE'
}
#endregion define hashtable
#region define calculated property (to be used with Select-Object)
<#
a calculated property is defined by a hashtable with keys "Name" and "Expression"
"Name" defines the name of the property (in this example, it is "AuditedAccessMask", but you can rename it to anything else)
"Expression" defines a scriptblock that calculates the content of this property
in this example, the scriptblock uses the hashtable defined earlier to translate each numeric
value to its friendly text counterpart:
#>
$AuditedAccessMask = @{
Name = 'AuditedAccessMask'
Expression = {
# property is an array, so process all values
$value = $_.AuditedAccessMask
$AuditedAccessMask_map[[int]$value]
}
}
#endregion define calculated property
# retrieve the instances, and output the properties "Caption" and "AuditedAccessMask". The latter
# is defined by the hashtable in $AuditedAccessMask:
Get-CimInstance -Class Win32_SecuritySettingAuditing | Select-Object -Property Caption, $AuditedAccessMask
# ...or dump content of property AuditedAccessMask:
$friendlyValues = Get-CimInstance -Class Win32_SecuritySettingAuditing |
Select-Object -Property $AuditedAccessMask |
Select-Object -ExpandProperty AuditedAccessMask
# output values
$friendlyValues
# output values as comma separated list
$friendlyValues -join ', '
# output values as bullet list
$friendlyValues | ForEach-Object { "- $_" }
Use $AuditedAccessMask_map to directly translate raw values from an instance
<#
this example uses a hashtable to manually translate raw numeric values
for property "Win32_SecuritySettingAuditing" to friendly text. This approach is ideal when
there is just one instance to work with.
Note: to use other properties than "Win32_SecuritySettingAuditing", look up the appropriate
translation hashtable for the property you would like to use instead.
#>
#region define hashtable to translate raw values to friendly text
# Please note: this hashtable is specific for property "Win32_SecuritySettingAuditing"
# to translate other properties, use their translation table instead
$AuditedAccessMask_map = @{
0 = 'FILE_LIST_DIRECTORY'
1 = 'FILE_ADD_FILE'
2 = 'FILE_ADD_SUBDIRECTORY'
3 = 'FILE_READ_EA'
4 = 'FILE_WRITE_EA'
5 = 'FILE_TRAVERSE'
6 = 'FILE_DELETE_CHILD'
7 = 'FILE_READ_ATTRIBUTES'
8 = 'FILE_WRITE_ATTRIBUTES'
16 = 'DELETE'
17 = 'READ_CONTROL'
18 = 'WRITE_DAC'
19 = 'WRITE_OWNER'
20 = 'SYNCHRONIZE'
}
#endregion define hashtable
# get one instance:
$instance = Get-CimInstance -Class Win32_SecuritySettingAuditing | Select-Object -First 1
<#
IMPORTANT: this example processes only one instance to illustrate
the number-to-text translation. To process all instances, replace
"Select-Object -First 1" with a "Foreach-Object" loop, and use
the iterator variable $_ instead of $instance
#>
# query the property
$rawValue = $instance.AuditedAccessMask
# translate raw value to friendly text:
$friendlyName = $AuditedAccessMask_map[[int]$rawValue]
# output value
$friendlyName
Use a switch statement inside a calculated property for Select-Object
<#
this example uses a switch clause to translate raw numeric
values for property "AuditedAccessMask" to friendly text. The switch
clause is embedded into a calculated property so there is
no need to refer to external variables for translation.
Note: to use other properties than "AuditedAccessMask", look up the appropriate
translation switch clause for the property you would like to use instead.
#>
#region define calculated property (to be used with Select-Object)
<#
a calculated property is defined by a hashtable with keys "Name" and "Expression"
"Name" defines the name of the property (in this example, it is "AuditedAccessMask", but you can rename it to anything else)
"Expression" defines a scriptblock that calculates the content of this property
in this example, the scriptblock uses the hashtable defined earlier to translate each numeric
value to its friendly text counterpart:
#>
$AuditedAccessMask = @{
Name = 'AuditedAccessMask'
Expression = {
# property is an array, so process all values
$value = $_.AuditedAccessMask
switch([int]$value)
{
0 {'FILE_LIST_DIRECTORY'}
1 {'FILE_ADD_FILE'}
2 {'FILE_ADD_SUBDIRECTORY'}
3 {'FILE_READ_EA'}
4 {'FILE_WRITE_EA'}
5 {'FILE_TRAVERSE'}
6 {'FILE_DELETE_CHILD'}
7 {'FILE_READ_ATTRIBUTES'}
8 {'FILE_WRITE_ATTRIBUTES'}
16 {'DELETE'}
17 {'READ_CONTROL'}
18 {'WRITE_DAC'}
19 {'WRITE_OWNER'}
20 {'SYNCHRONIZE'}
default {"$value"}
}
}
}
#endregion define calculated property
# retrieve all instances...
Get-CimInstance -ClassName Win32_SecuritySettingAuditing |
# ...and output properties "Caption" and "AuditedAccessMask". The latter is defined
# by the hashtable in $AuditedAccessMask:
Select-Object -Property Caption, $AuditedAccessMask
Use the Enum from above to auto-translate the code values
<#
this example translates raw values by means of type conversion
the friendly names are defined as enumeration using the
keyword "enum" (PowerShell 5 or better)
The raw value(s) are translated to friendly text by
simply converting them into the enum type.
Note: to use other properties than "Win32_SecuritySettingAuditing", look up the appropriate
enum definition for the property you would like to use instead.
#>
#region define enum with value-to-text translation:
Enum EnumAuditedAccessMask
{
FILE_LIST_DIRECTORY = 0
FILE_ADD_FILE = 1
FILE_ADD_SUBDIRECTORY = 2
FILE_READ_EA = 3
FILE_WRITE_EA = 4
FILE_TRAVERSE = 5
FILE_DELETE_CHILD = 6
FILE_READ_ATTRIBUTES = 7
FILE_WRITE_ATTRIBUTES = 8
DELETE = 16
READ_CONTROL = 17
WRITE_DAC = 18
WRITE_OWNER = 19
SYNCHRONIZE = 20
}
#endregion define enum
# get one instance:
$instance = Get-CimInstance -Class Win32_SecuritySettingAuditing | Select-Object -First 1
<#
IMPORTANT: this example processes only one instance to focus on
the number-to-text type conversion.
To process all instances, replace "Select-Object -First 1"
with a "Foreach-Object" loop, and use the iterator variable
$_ instead of $instance
#>
# query the property:
$rawValue = $instance.AuditedAccessMask
#region using strict type conversion
<#
Note: strict type conversion fails if the raw value is
not defined by the enum. So if the list of allowable values
was extended and the enum does not match the value,
an exception is thrown
#>
# convert the property to the enum **AuditedAccessMask**
[EnumAuditedAccessMask]$rawValue
# get a comma-separated string:
[EnumAuditedAccessMask]$rawValue -join ','
#endregion
#region using operator "-as"
<#
Note: the operator "-as" accepts values not defined
by the enum and returns $null instead of throwing
an exception
#>
$rawValue -as [EnumAuditedAccessMask]
#endregion
Enums must cover all possible values. If AuditedAccessMask returns a value that is not defined in the enum, an exception occurs. The exception reports the value that was missing in the enum. To fix, add the missing value to the enum.
GuidInheritedObjectType
GUID of the type of object from which this object inherits.
Get-CimInstance -ClassName Win32_SecuritySettingAuditing | Select-Object -Property SecuritySetting, Trustee, GuidInheritedObjectType
GuidObjectType
GUID of the type of object to which the security settings are applied.
Get-CimInstance -ClassName Win32_SecuritySettingAuditing | Select-Object -Property SecuritySetting, Trustee, GuidObjectType
Inheritance
Bit flags specifying how the audit policies are inherited.
Get-CimInstance -ClassName Win32_SecuritySettingAuditing | Select-Object -Property SecuritySetting, Trustee, Inheritance
SecuritySetting
KEY PROPERTY WIN32_SECURITYSETTING
Reference to the instance representing the security settings of an object.
Get-CimInstance -ClassName Win32_SecuritySettingAuditing | Select-Object -Property SecuritySetting, Trustee
Trustee
Reference to the instance representing the trustee for this audit entry.
Get-CimInstance -ClassName Win32_SecuritySettingAuditing | Select-Object -Property SecuritySetting, Trustee
Type
Type of access specified for the trustee.
Type returns a numeric value. To translate it into a meaningful text, use any of the following approaches:
Use a PowerShell Hashtable
$Type_map = @{
0 = 'Audit success'
1 = 'Audit failure'
}
Use a switch statement
switch([int]$value)
{
0 {'Audit success'}
1 {'Audit failure'}
default {"$value"}
}
Use Enum structure
Enum EnumType
{
Audit_success = 0
Audit_failure = 1
}
Examples
Use $Type_map in a calculated property for Select-Object
<#
this example uses a hashtable to translate raw numeric values for
property "Type" to friendly text
Note: to use other properties than "Type", look up the appropriate
translation hashtable for the property you would like to use instead.
#>
#region define hashtable to translate raw values to friendly text
# Please note: this hashtable is specific for property "Type"
# to translate other properties, use their translation table instead
$Type_map = @{
0 = 'Audit success'
1 = 'Audit failure'
}
#endregion define hashtable
#region define calculated property (to be used with Select-Object)
<#
a calculated property is defined by a hashtable with keys "Name" and "Expression"
"Name" defines the name of the property (in this example, it is "Type", but you can rename it to anything else)
"Expression" defines a scriptblock that calculates the content of this property
in this example, the scriptblock uses the hashtable defined earlier to translate each numeric
value to its friendly text counterpart:
#>
$Type = @{
Name = 'Type'
Expression = {
# property is an array, so process all values
$value = $_.Type
$Type_map[[int]$value]
}
}
#endregion define calculated property
# retrieve the instances, and output the properties "Caption" and "Type". The latter
# is defined by the hashtable in $Type:
Get-CimInstance -Class Win32_SecuritySettingAuditing | Select-Object -Property Caption, $Type
# ...or dump content of property Type:
$friendlyValues = Get-CimInstance -Class Win32_SecuritySettingAuditing |
Select-Object -Property $Type |
Select-Object -ExpandProperty Type
# output values
$friendlyValues
# output values as comma separated list
$friendlyValues -join ', '
# output values as bullet list
$friendlyValues | ForEach-Object { "- $_" }
Use $Type_map to directly translate raw values from an instance
<#
this example uses a hashtable to manually translate raw numeric values
for property "Win32_SecuritySettingAuditing" to friendly text. This approach is ideal when
there is just one instance to work with.
Note: to use other properties than "Win32_SecuritySettingAuditing", look up the appropriate
translation hashtable for the property you would like to use instead.
#>
#region define hashtable to translate raw values to friendly text
# Please note: this hashtable is specific for property "Win32_SecuritySettingAuditing"
# to translate other properties, use their translation table instead
$Type_map = @{
0 = 'Audit success'
1 = 'Audit failure'
}
#endregion define hashtable
# get one instance:
$instance = Get-CimInstance -Class Win32_SecuritySettingAuditing | Select-Object -First 1
<#
IMPORTANT: this example processes only one instance to illustrate
the number-to-text translation. To process all instances, replace
"Select-Object -First 1" with a "Foreach-Object" loop, and use
the iterator variable $_ instead of $instance
#>
# query the property
$rawValue = $instance.Type
# translate raw value to friendly text:
$friendlyName = $Type_map[[int]$rawValue]
# output value
$friendlyName
Use a switch statement inside a calculated property for Select-Object
<#
this example uses a switch clause to translate raw numeric
values for property "Type" to friendly text. The switch
clause is embedded into a calculated property so there is
no need to refer to external variables for translation.
Note: to use other properties than "Type", look up the appropriate
translation switch clause for the property you would like to use instead.
#>
#region define calculated property (to be used with Select-Object)
<#
a calculated property is defined by a hashtable with keys "Name" and "Expression"
"Name" defines the name of the property (in this example, it is "Type", but you can rename it to anything else)
"Expression" defines a scriptblock that calculates the content of this property
in this example, the scriptblock uses the hashtable defined earlier to translate each numeric
value to its friendly text counterpart:
#>
$Type = @{
Name = 'Type'
Expression = {
# property is an array, so process all values
$value = $_.Type
switch([int]$value)
{
0 {'Audit success'}
1 {'Audit failure'}
default {"$value"}
}
}
}
#endregion define calculated property
# retrieve all instances...
Get-CimInstance -ClassName Win32_SecuritySettingAuditing |
# ...and output properties "Caption" and "Type". The latter is defined
# by the hashtable in $Type:
Select-Object -Property Caption, $Type
Use the Enum from above to auto-translate the code values
<#
this example translates raw values by means of type conversion
the friendly names are defined as enumeration using the
keyword "enum" (PowerShell 5 or better)
The raw value(s) are translated to friendly text by
simply converting them into the enum type.
Note: to use other properties than "Win32_SecuritySettingAuditing", look up the appropriate
enum definition for the property you would like to use instead.
#>
#region define enum with value-to-text translation:
Enum EnumType
{
Audit_success = 0
Audit_failure = 1
}
#endregion define enum
# get one instance:
$instance = Get-CimInstance -Class Win32_SecuritySettingAuditing | Select-Object -First 1
<#
IMPORTANT: this example processes only one instance to focus on
the number-to-text type conversion.
To process all instances, replace "Select-Object -First 1"
with a "Foreach-Object" loop, and use the iterator variable
$_ instead of $instance
#>
# query the property:
$rawValue = $instance.Type
#region using strict type conversion
<#
Note: strict type conversion fails if the raw value is
not defined by the enum. So if the list of allowable values
was extended and the enum does not match the value,
an exception is thrown
#>
# convert the property to the enum **Type**
[EnumType]$rawValue
# get a comma-separated string:
[EnumType]$rawValue -join ','
#endregion
#region using operator "-as"
<#
Note: the operator "-as" accepts values not defined
by the enum and returns $null instead of throwing
an exception
#>
$rawValue -as [EnumType]
#endregion
Enums must cover all possible values. If Type returns a value that is not defined in the enum, an exception occurs. The exception reports the value that was missing in the enum. To fix, add the missing value to the enum.
Examples
List all instances of Win32_SecuritySettingAuditing
Get-CimInstance -ClassName Win32_SecuritySettingAuditing
Learn more about Get-CimInstance
and the deprecated Get-WmiObject
.
View all properties
Get-CimInstance -ClassName Win32_SecuritySettingAuditing -Property *
View key properties only
Get-CimInstance -ClassName Win32_SecuritySettingAuditing -KeyOnly
Selecting Properties
To select only some properties, pipe the results to Select-Object -Property a,b,c
with a comma-separated list of the properties you require. Wildcards are permitted.
Get-CimInstance
always returns all properties but only retrieves the ones that you specify. All other properties are empty but still present. That’s why you need to pipe the results into Select-Object
if you want to limit the visible properties, i.e. for reporting.
Selecting Properties
The code below lists all available properties. Remove the ones you do not need:
$properties = 'AuditedAccessMask',
'GuidInheritedObjectType',
'GuidObjectType',
'Inheritance',
'SecuritySetting',
'Trustee',
'Type'
Get-CimInstance -ClassName Win32_SecuritySettingAuditing | Select-Object -Property $properties
Limiting Network Bandwidth
If you work remotely, it makes sense to limit network bandwidth by filtering the properties on the server side, too:
Get-CimInstance -Class Win32_SecuritySettingAuditing -Property $property |
Select-Object -Property $property
Selecting Instances
To select some instances, use Get-CimInstance and a WMI Query. The wildcard character in WMI Queries is % (and not “*”).
The parameter -Filter runs a simple query.
Listing all instances where the property Caption starts with “A”
Get-CimInstance -Class Win32_SecuritySettingAuditing -Filter 'Caption LIKE "a%"'
Using a WQL Query
The parameter -Query uses a query similar to SQL and combines the parameters -Filter and -Property. This returns all instances where the property Caption starts with “A”, and returns the properties specified:
Get-CimInstance -Query "SELECT GuidInheritedObjectType, Inheritance, AuditedAccessMask, Type FROM Win32_SecuritySettingAuditing WHERE Caption LIKE 'a%'"
Any property you did not specify is still present but empty. You might need to use
Select-Object
to remove all unwanted properties:Get-CimInstance -Query "SELECT GuidInheritedObjectType, Inheritance, AuditedAccessMask, Type FROM Win32_SecuritySettingAuditing WHERE Caption LIKE 'a%'" | Select-Object -Property GuidInheritedObjectType, Inheritance, AuditedAccessMask, Type
Accessing Remote Computers
To access remote systems, you need to have proper permissions. User the parameter -ComputerName to access one or more remote systems.
Authenticating as Current User
# one or more computer names or IP addresses:
$list = 'server1', 'server2'
# authenticate with your current identity:
$result = Get-CimInstance -ClassName Win32_SecuritySettingAuditing -ComputerName $list
$result
Authenticating as Different User
Use a CIMSession object to authenticate with a new identity:
# one or more computer names or IP addresses:
$list = 'server1', 'server2'
# authenticate with a different identity:
$cred = Get-Credential -Message 'Authenticate to retrieve WMI information:'
$session = New-CimSession -ComputerName $list -Credential $cred
$result = Get-CimInstance Win32_SecuritySettingAuditing -CimSession $session
# remove the session after use (if you do not plan to re-use it later)
Remove-CimSession -CimSession $session
$result
Learn more about accessing remote computers.
Requirements
To use Win32_SecuritySettingAuditing, the following requirements apply:
PowerShell
Get-CimInstance
was introduced with PowerShell Version 3.0, which in turn was introduced on clients with Windows 8 and on servers with Windows Server 2012.
If necessary, update Windows PowerShell to Windows PowerShell 5.1, or install PowerShell 7 side-by-side.
Operating System
Win32_SecuritySettingAuditing was introduced on clients with Windows Vista and on servers with Windows Server 2008.
Namespace
Win32_SecuritySettingAuditing lives in the Namespace Root/CIMV2. This is the default namespace. There is no need to use the -Namespace parameter in Get-CimInstance
.
Implementation
Win32_SecuritySettingAuditing is implemented in CIMWin32.dll and defined in Secrcw32.mof. Both files are located in the folder C:\Windows\system32\wbem
:
explorer $env:windir\system32\wbem
notepad $env:windir\system32\wbem\Secrcw32.mof