Solved

Active Directory:  Monitoring Local and Remote Logins

Posted on 2014-02-24
3
309 Views
Last Modified: 2014-04-07
Hello Experts!

    What would be the best way to monitor local and remote log-ins with the same account?  For example, lets say that I wanted to see if someone was logging in normally with their network account but also logging in remotely (via VPN) with their account as well.  Sharing their credentials in other words.    

      e.g.  I log into my account with my network credentials, then call John Doe and and share my log in credentials with him.  He then logs in via the VPN with my credentials.  Is there a way to track that or a script of some sort that could help keep tabs on this behavior?
0
Comment
Question by:itsmevic
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 5

Accepted Solution

by:
Pankaj_401 earned 250 total points
ID: 39884893
Hi Itsm,
You can download AD auditor tool from this MS-networking utility link(http://technet.microsoft.com/en-us/sysinternals/bb795532.aspx) to monitor local and remote log-ins in active directory.
Additionally, you can have also explore this link(http://www.activedirectoryaudit.com/) which seems fit in your required AD environment.
0
 
LVL 9

Assisted Solution

by:VirastaR
VirastaR earned 250 total points
ID: 39885736
Hi,

You can achieve this through reviewing Security Events

Tracking User Logon Activity Using Logon Events
http://blogs.msdn.com/b/ericfitz/archive/2008/08/20/tracking-user-logon-activity-using-logon-events.aspx

PFA - Quick Reference Charts of Events.

Hope that helps :)
0
 

Author Closing Comment

by:itsmevic
ID: 39984600
Fantastic input, thank you both!
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article runs through the process of deploying a single EXE application selectively to a group of user.
Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question