One of the most challenging tasks Administrators face on a day-to-day basis is simply managing user accounts in Active Directory. In any network environment, unauthorized access to user accounts can lead to the exposure of confidential data. In your organization, you may have numerous user accounts that have been disabled or locked out to prevent that person from accessing the IT environment. Some accounts, such as temporary user accounts, need to be disabled, either automatically or manually, when they are no longer needed. If one of these disabled accounts suddenly re-gains access, it can be a potential threat to your IT security. So, keeping track of all recently enabled accounts in your organization’s network helps keep your critical data secure. In this article, we will discuss the steps you need to take in order to detect who enabled a user account in Active Directory.
1. Firstly run “gpedit.msc” command in “Run” box or “Command Prompt” to open the Group Policy Management Console.
2. Edit the default domain policy or customized domain wide policy. We recommend you create a new GPO, link it to the domain and edit it from there. You can link a new GPO from the domain by right clicking on it.
3. Right-click the default or newly created GPO and click “Edit”. “Group Policy Management Editor” appears on the screen.
4. Go to “Computer Configuration” ➔ “Policies” ➔ ”Windows Settings” ➔ “Security Settings” ➔ “Local Policies” ➔ “Audit Policy”.
5. Double-click “Audit Account Management” Policy. Select the “Define these policy settings” option.
6. Select both “Success” and “Failure”.
7. Click “Apply” and “OK”.
In “Group Policy Management” right-click the defined OU and then select “Group Policy Update.” Alternatively, you can run the following command on the command prompt:
1. In the “Run” box, type “ADSIEdit.msc” and press “Enter” key to open its console.
2. Right-click “ADSI Edit”, the top node in left panel.
3. In the context menu, click “Conenct to” to open “Connection Settings” window. Here, click “Select a well-known Naming Context”.
4. In the drop-down menu, click “Default Naming Context”
5. Right-click the “Domain DNS object” and click “Properties”.
6. Switch to the “Security” tab
7. Click “Advanced” to access “Advanced Security Settings”.
8. Switch to the “Auditing” tab.
9. Click “Add” to add an auditing entry.
10. Click “Select a Principal” and add “Everyone”. (You can also add any specific user, computer, group or service account.)
11. Now, select “All” in “Types” drop-down menu.
12. Select “This object and all descendent objects” in “Applies to” drop-down menu.
13. Click checkboxes to select all permissions except the following:
- Full control
- List contents
- Read all Properties
- Read permissions
14. Click “OK”. The auditing entry of these permissions for “Everyone” are displayed in the “Auditing” Tab of “Advanced Security Settings”.
15. Click “Apply” and “OK” to close the “Auditing Entry” window. It takes you back to the “Security” Tab for object properties.
16. Click “Apply” and “OK” to close object properties.
17. Close the “ADSIEdit” window.
Perform the following steps to view the change event in Event Viewer:
1. Start “Event Viewer” and search for the event ID 4722 in the Security Logs. This ID identifies a user account that was enabled.
The above image displays the user who enabled a user account. You can scroll down to view which user has been enabled.
An excellent auditing solution – LepideAuditor for Active Directory
Want a quicker, simpler and (in all honesty) better way of detecting when changes are being made to user accounts? LepideAuditor for Active Directory can provide you with this level of in-depth visibility with real-time alerts that help you overcome the limitations of native auditing. The following image shows the level of detail this solution provides, including who, when and where details of the modified accounts which can be easily sorted and filtered.
This article should give you an idea about two very different ways by which you can track changes made to user accounts in Active Directory. Hopefully, you should be able to see that the native auditing method is fairly cumbersome and time-consuming. LepideAuditor, however, is a simple and user-friendly auditing solution, marketed at an affordable price for businesses of all sizes, sectors and budgets.
- How to identify the source of Account Lockouts in Active Directory
- How to Audit Successful Logon/Logoff and Failed Logons in Active Directory
- How to enable the Security Auditing of Active Directory
- How to track changes made in Active Directory
- How to delegate rights to “Unlock account”
- How to track Privileged Users' Activities in Active Directory