Solved

How do i find the computers/resources that are authenticating using a particular account

Posted on 2011-02-28
5
200 Views
Last Modified: 2012-05-11
I have an AD environment and i want to find all the computers/applications/services that are configured to use a particular account. Kind of like using the accountlockstatus tool but in this scenario the account is not locked out. I just want to know which resource is using it to authenticate.

Thanks
0
Comment
Question by:socan
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:Navdeep
ID: 35000370
There are two things Authentication and Authorization.

You can see authentication events on PDC and DC which Account has used to logon, Ideally you can use EventComMbt tool to query all the DC for logon event id.

Authorization. This will be based on NTFS permission. For this you need to enable Auditing. Then you can analyze the logs to find out who has accessed the files/folders.
0
 

Author Comment

by:socan
ID: 35021874
I was looking more less for a utility that would this. Is there any such thing available?
0
 
LVL 12

Expert Comment

by:Navdeep
ID: 35022017
EventComMBT is a utility that can tell you based on the event id found in the security logs across ur domain controllers.
0
 

Accepted Solution

by:
socan earned 0 total points
ID: 35977419
used netwrix
0
 

Author Closing Comment

by:socan
ID: 36001552
used own comment as solution because none of the answers provided gave me what i was asking for
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip Migration Tip #1 – Source Server Health can be found here: http://www.experts-exchang…
Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now