[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

Active Directory Event Logs

Posted on 2010-11-10
3
Medium Priority
?
249 Views
Last Modified: 2012-05-10
Hi

One of our System engineers moved a computer into another container in AD, which effected the user rights on aclients machine.

I need to prove that he moved the computer into this container,would  there be a log of this in events logs?

Thanks
0
Comment
Question by:Dan560
  • 2
3 Comments
 
LVL 27

Accepted Solution

by:
KenMcF earned 2000 total points
ID: 34100993
AD Auditing would have to be enabled and you can comb through the event logs. You can use eventcomb to go through them



http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=5139
http://support.microsoft.com/kb/814595
http://support.microsoft.com/kb/308471
0
 
LVL 2

Author Comment

by:Dan560
ID: 34101004
Thanks, Would there still be a log of this?
0
 
LVL 27

Expert Comment

by:KenMcF
ID: 34101940
It would all depend if you have logging enabled, how large your security logs are, and fast they roll over. You can use eventcomb to go through.
0

Featured Post

Easily manage email signatures in Office 365

Managing email signatures in Office 365 can be a challenging task if you don't have the right tool. CodeTwo Email Signatures for Office 365 will help you implement a unified email signature look, no matter what email client is used by users. Test it for free!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Native ability to set a user account password via AD GPO was removed because the passwords can be easily decrypted by any authenticated user in the domain. Microsoft recommends LAPS as a replacement and I have written an article that does something …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

608 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question