Many computer systems, network devices and other technological hardware used in the enterprise can audit and log various activities. These activities include network traffic, internet access, creating ...
Long story short I changed the Default Domain GPO (stupid I know) so that only Administrators had the Manage auditing and security log right under Computer Configuration > Security Settings > Local ...