Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How do i find the computers/resources that are authenticating using a particular account

Posted on 2011-02-28
5
Medium Priority
?
209 Views
Last Modified: 2012-05-11
I have an AD environment and i want to find all the computers/applications/services that are configured to use a particular account. Kind of like using the accountlockstatus tool but in this scenario the account is not locked out. I just want to know which resource is using it to authenticate.

Thanks
0
Comment
Question by:socan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:Navdeep
ID: 35000370
There are two things Authentication and Authorization.

You can see authentication events on PDC and DC which Account has used to logon, Ideally you can use EventComMbt tool to query all the DC for logon event id.

Authorization. This will be based on NTFS permission. For this you need to enable Auditing. Then you can analyze the logs to find out who has accessed the files/folders.
0
 

Author Comment

by:socan
ID: 35021874
I was looking more less for a utility that would this. Is there any such thing available?
0
 
LVL 12

Expert Comment

by:Navdeep
ID: 35022017
EventComMBT is a utility that can tell you based on the event id found in the security logs across ur domain controllers.
0
 

Accepted Solution

by:
socan earned 0 total points
ID: 35977419
used netwrix
0
 

Author Closing Comment

by:socan
ID: 36001552
used own comment as solution because none of the answers provided gave me what i was asking for
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question