Random User Authentications

We purchased Rapid7 IDR to monitor the activity on our network and we're seeing some odd authentications. User accounts and service accounts are authenticating from computer to computer or computer to server even when the user is not working (overnight activity). Is there any tool to identify this activity or what application is causing the authentication attempt? IDR is getting this information from Active Directory logs.
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Tom CieslikIT EngineerCommented:
You need to enable audit on each user you want to observe to see movement in security log on Windows Server Management.
If you'll enable audit for user then all movement will be placed in Windows Security Log
ICCNetworkAdminAuthor Commented:
Tom -  How do I enable audit for each user?
Tom CieslikIT EngineerCommented:
Audit is available on each network folder properties but if you have a lost of users there is a lot of work.
I thin it's maybe better solution for you is to limit working hours for each user to prevent him to log on to network after working hours.
This can be done on Active Directory Users And Computers / user properties / Account Tab / Logon Hours

This will allow you to manage users working hours,
Please consider users who are log in to Exchange server from Home after hours

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Determine the Perfect Price for Your IT Services

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden with our free interactive tool and use it to determine the right price for your IT services. Download your free eBook now!

Ajit SinghCommented:
AD DS Auditing Step-by-Step Guide:

Here is another article which lets you how to enable the security auditing of Active Directory and how to extract its events from Event Viewer.

Hope this helps!
If you have mobile users with an Exchange login actions could also be generated by  ActiveSync. Also are the user login attempts from the same devices or random. I ask since I am wondering if user are locking there desktops and have apps running in the background.
Tom CieslikIT EngineerCommented:
Best solution provided, no more other questions from author
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.