Solved

How do i find the computers/resources that are authenticating using a particular account

Posted on 2011-02-28
5
207 Views
Last Modified: 2012-05-11
I have an AD environment and i want to find all the computers/applications/services that are configured to use a particular account. Kind of like using the accountlockstatus tool but in this scenario the account is not locked out. I just want to know which resource is using it to authenticate.

Thanks
0
Comment
Question by:socan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:Navdeep
ID: 35000370
There are two things Authentication and Authorization.

You can see authentication events on PDC and DC which Account has used to logon, Ideally you can use EventComMbt tool to query all the DC for logon event id.

Authorization. This will be based on NTFS permission. For this you need to enable Auditing. Then you can analyze the logs to find out who has accessed the files/folders.
0
 

Author Comment

by:socan
ID: 35021874
I was looking more less for a utility that would this. Is there any such thing available?
0
 
LVL 12

Expert Comment

by:Navdeep
ID: 35022017
EventComMBT is a utility that can tell you based on the event id found in the security logs across ur domain controllers.
0
 

Accepted Solution

by:
socan earned 0 total points
ID: 35977419
used netwrix
0
 

Author Closing Comment

by:socan
ID: 36001552
used own comment as solution because none of the answers provided gave me what i was asking for
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question