Solved

AD Auditing

Posted on 2014-10-09
6
110 Views
Last Modified: 2014-11-20
Is there a way (possibly with PowerShell) to audit changes made on certain high privilege groups (ie domain admins) and send out an email when a user is added?  I know these events are logged on the DC, but we want to be more proactive on monitoring these changes.
0
Comment
Question by:myhelpermonkey
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 81

Expert Comment

by:David Johnson, CD, MVP
ID: 40371606
in the dc's event logs find the event id and then you can select send an email on event.
http://blogs.technet.com/b/jhoward/archive/2010/06/16/getting-event-log-contents-by-email-on-an-event-log-trigger.aspx
0
 
LVL 13

Expert Comment

by:Rizzle
ID: 40371608
I know it might not help but we use something called AD Audit and Ad Manager internally which we think works perfectly. Not only does it tell us when someone is added or removed from the Domain Admin groups but it also gives you information like who deleted an AD account, who disabled/enabled an AD account, who's created and account and the biggest one to us any changes to any Service accounts. Bear in mind this tool has also helped us solve AD account which have continuously locked out for being left logged in on a machine or on a phone using rogue credentials. I would highly advise the use of the above 2 tools.
0
 
LVL 81

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 250 total points
ID: 40372290
0
 

Author Comment

by:myhelpermonkey
ID: 40373528
What event ID's should we be monitoring to get alerted for group changes? I would also want to limit the alerts to just critical AD groups so we are not flooded with emails.  Is that possible to do based on the first suggestion that was offered?
0
 
LVL 17

Accepted Solution

by:
Learnctx earned 250 total points
ID: 40374210
I use Splunk (log retention and alerting) and SCOM (alerting). Right now I log around 200GB of AD logs a day into Splunk. Splunk allow you to log 500MB/day for free which is achievable if you filter the logs to only include group change events.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
In previous parts of this Nano Server deployment series, we learned how to create, deploy and configure Nano Server as a Hyper-V host. In this part, we will look for a clustering option. We will create a Hyper-V cluster of 3 Nano Server host nodes w…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question