Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Active Directory Event Logs

Posted on 2010-11-10
3
Medium Priority
?
245 Views
Last Modified: 2012-05-10
Hi

One of our System engineers moved a computer into another container in AD, which effected the user rights on aclients machine.

I need to prove that he moved the computer into this container,would  there be a log of this in events logs?

Thanks
0
Comment
Question by:Dan560
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 27

Accepted Solution

by:
KenMcF earned 2000 total points
ID: 34100993
AD Auditing would have to be enabled and you can comb through the event logs. You can use eventcomb to go through them



http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=5139
http://support.microsoft.com/kb/814595
http://support.microsoft.com/kb/308471
0
 
LVL 2

Author Comment

by:Dan560
ID: 34101004
Thanks, Would there still be a log of this?
0
 
LVL 27

Expert Comment

by:KenMcF
ID: 34101940
It would all depend if you have logging enabled, how large your security logs are, and fast they roll over. You can use eventcomb to go through.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question