How to Audit Active Directory Group Membership Changes

Active Directory group membership auditing is the process of tracking and recording changes to user membership within AD security and distribution groups. This is essential for security because group membership determines access privileges to sensitive resources and systems within an organization.

Quick Summary: To audit Active Directory group membership changes, you can use the native Windows Event Viewer method by enabling auditing through Group Policy and monitoring Event IDs 4728, 4732, and 4756 (for member additions) and 4729, 4733, and 4757 (for member removals). Alternatively, third-party auditing tools like Lepide Active Directory Change Reporter provide simplified, consolidated reporting with greater context and real-time alerting capabilities.

Monitoring Active Directory group membership changes is crucial for maintaining a secure and well-managed IT environment. Group membership determines access privileges and permissions to sensitive resources and systems within an organization.

Here are the key reasons why monitoring these changes is important:

  • Security Breach Detection: By monitoring group membership changes, organizations can detect and respond to unauthorized access attempts. Any unauthorized addition or removal of users from critical groups could signify a security breach or insider threat. Prompt detection allows for immediate investigation and mitigation, preventing potential data breaches or unauthorized system access.
  • Regulatory Compliance: Many regulatory frameworks, such as the Payment Card Industry Data Security Standard (PCI DSS), the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), and the Sarbanes-Oxley Act (SOX), require organizations to maintain strict access controls and regularly audit user permissions. Monitoring group membership changes helps ensure compliance with these regulations, reducing the risk of penalties or legal consequences.
  • Accountability and Auditing: Monitoring group membership changes establishes accountability for any changes made. It allows administrators to identify who made the modifications, when they occurred, and the reasons behind them. This information is valuable for auditing purposes and assists in troubleshooting and tracking any inappropriate actions.
  • Change Management: Active Directory group membership changes often result from employee onboarding, offboarding, or role changes. Monitoring these changes helps organizations maintain proper change management practices, ensuring that users have appropriate access privileges and that the principle of least privilege is enforced consistently.

In this article, we go through how to audit and track Active Directory group membership changes. We will go through the native method first, and then we will show how much simpler the process is when using Lepide Active Directory Change Reporter.

Track Active Directory Group Membership Changes using Event Logs

Prerequisites

Before beginning the native auditing configuration, ensure you have:

  • Windows Server Version: Windows Server 2008 R2 or later (Windows Server 2016 or later recommended for enhanced auditing features)
  • Administrative Permissions: Domain Admin or equivalent privileges to modify Group Policy Objects and ADSI settings
  • Group Policy Configuration: Access to Group Policy Management Console (GPMC) and the ability to create or modify GPOs linked to the domain

Below are the steps for native auditing

Step 1: Enable Active Directory Auditing through Group Policy

  1. Type GPMC.MSC in “Run” box and press “Enter.” The “Group Policy Management” console opens up.
  2. Go to “Forest” → “Domains” → “www.domain.com” in the left panel.
  3. Right-click the “Default Domain Policy” or any customized domain-wide policy. (However, we recommend you to create a new GPO, link it to the domain, and edit it).
  4. Select “Edit” to access “Group Policy Management Editor.”
  5. Next, navigate to “Computer Configuration” → “Policies” → “Windows Settings” → “Security Settings” → “Local Policies” → “Audit Policies”.
    GP Management Editor
    Figure 1: Group Policy Management Editor
  6. Management and access properties.
  7. Click to select the “Define these policy settings” option.
  8. Select both the “Success” and “Failure” checkboxes to enable audit policy for monitoring successful events.
  9. Now, close “Group Policy Management Editor”.
  10. After closing it, you will be back at “Group Policy Management Console”. Select the GPO that you have modified.
  11. In the “Security” filtering section in the right pane, click “Add” to apply this GPO to all objects of Active Directory. Type “Everyone” in the dialog box that opens up. Click “Check Names” and “OK” to add the value.
  12. Close “Group Policy Management Console”.
  13. It is recommended to update the Group Policy instantly so that new changes can be applied to the entire domain. Run the following command at the Command Prompt or in the “Run” box to update the Group Policies on all domain controllers.

    gpupdate /force

Step 2: Enable Auditing of Active Directory through ADSI edit

  1. In “Start Menu” or in “Control Panel”, “Administrative Tools” and open “ADSI Edit.”
  2. Right-click the ADSI Edit node in the left panel and select “Connect To”.
  3. In the “Connection Settings” window, select “Default Naming Context” in the drop-down menu of selecting a well-known Naming Context.
    Connection Settings for ADSI Edit
    Figure 2: Connection Settings for ADSI Edit
  4. Click “OK” to establish the connection to the Default Naming Context of the domain. It is a node displayed in the left tree pane, just below the top ADSI Edit node.
  5. Expand “Default Naming Context [dc.www.doamin.com]” and access the top node under it.
  6. Right-click this top node having the fully qualified domain name and click “Properties” in the context menu.
  7. In the properties, switch to the “Security” tab and click the “Advanced” button to access “Advanced Security Settings for www”.
  8. Switch to the “Auditing” tab and click the “Add” button to add a new auditing entry. It shows the “Auditing Entry for www” window on the screen.
    Auditing Entry window
    Figure 3: Auditing Entry window
  9. Click “Select a principal” to add“Everyone”.
  10. Select type as “Success” and applies to as “This object and descendant objects.”
  11. Under “Permissions,” select all checkboxes by clicking “Full Control,” except the following permissions.
    • Full Control
    • List contents
    • Read all properties
    • Read permissions
  12. Click “OK”.

Step 3: Track Group Membership changes through Event Viewer

To track the changes in Active Directory, open “Windows Event Viewer,” go to “Windows logs” → “Security.” Use the “Filter Current Log” in the right pane to find relevant events.

The following are some of the events related to group membership changes.

Event ID Description
4727 A security-enabled global group was created
4728 A member was added to a security-enabled global group
4729 A member was removed from a security-enabled global group
4730 A security-enabled global group was deleted
4731 A security-enabled local group was created
4732 A member was added to a security-enabled local group
4733 A member was removed from a security-enabled local group
4734 A security-enabled local group was deleted
4756 A member was added to a security-enabled universal group
4757 A member was removed from a security-enabled universal group

Below screenshot indicates a Security Group is created.

security-enabled group is created
Figure 4: A security-enabled group is created

The following screenshot shows more detail of this event.

showing details
Figure 5: Showing details. Test Group 1 is created.

The following screenshot filters all events related to changes in Active Directory Group Memberships.

different events visible in the Event Viewer
Figure 6: Different events visible in the Event Viewer

PowerShell Query Example

To programmatically query group membership change events, use the following PowerShell command:

Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4728,4729,4732,4733,4756,4757} | Select-Object TimeCreated, Id, Message

The Issues with Auditing AD Group Membership Changes Natively

Native auditing has significant limitations, especially when it comes to Active Directory and Group Policy. Multiple events are generated for a single change—for example, adding one member to a group can produce 2-3 separate log entries that must be correlated manually.

Looking for a critical change in real time is very difficult. The Security log generates thousands of events daily, making it challenging to identify relevant group membership changes without extensive filtering. It is also very difficult to draw conclusions, as events lack context on their own. You cannot see before and after values or understand the business impact of a change. In many cases, relying on native auditing when auditing AD group membership changes will not be enough to ensure the security and operability of Active Directory.

How Lepide Change Reporter for AD (Free Tool) Helps

Lepide Change Reporter for Active Directory (Free Tool) overcomes the limitations of Native Auditing with detailed, contextual, and intelligent Active Directory auditing.

Lepide displays a single event for every change made so that you get all the critical audit information you need in a single pane of glass.

In the following image, you can see a “Group Modifications” report generated in solution. It shows all group membership changes made in a given period. It also shows you the answers to who, what, when, and where questions in a way that is simple to read and understand.

Group Membership Changes Report
Figure 7: Group Modifications Report

Using Lepide, you’ll be able to get far more visibility into the states and changes of your Active Directory. You’ll be able to determine the effective permissions of your users, see when those permissions change and see what data the users have access to.

Native Auditing vs. Lepide

Method Complexity Level Time Investment Key Limitations
Native Event Viewer High Significant setup and ongoing monitoring Multiple events per change, no context, difficult real-time detection
Lepide Change Reporter Low Minimal setup Requires third-party tool installation
Audit Group Membership changes with Lepide Change Reporter (Free Tool)
Fill in the rest of the form to
download the free tool
x