Random User Authentications

We purchased Rapid7 IDR to monitor the activity on our network and we're seeing some odd authentications. User accounts and service accounts are authenticating from computer to computer or computer to server even when the user is not working (overnight activity). Is there any tool to identify this activity or what application is causing the authentication attempt? IDR is getting this information from Active Directory logs.
ICCNetworkAdminAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Tom CieslikIT EngineerCommented:
You need to enable audit on each user you want to observe to see movement in security log on Windows Server Management.
If you'll enable audit for user then all movement will be placed in Windows Security Log
0
ICCNetworkAdminAuthor Commented:
Tom -  How do I enable audit for each user?
0
Tom CieslikIT EngineerCommented:
Audit is available on each network folder properties but if you have a lost of users there is a lot of work.
I thin it's maybe better solution for you is to limit working hours for each user to prevent him to log on to network after working hours.
This can be done on Active Directory Users And Computers / user properties / Account Tab / Logon Hours

This will allow you to manage users working hours,
Please consider users who are log in to Exchange server from Home after hours
1

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Simplify Active Directory Administration

Administration of Active Directory does not have to be hard.  Too often what should be a simple task is made more difficult than it needs to be.The solution?  Hyena from SystemTools Software.  With ease-of-use as well as powerful importing and bulk updating capabilities.

Ajit SinghCommented:
AD DS Auditing Step-by-Step Guide:
https://technet.microsoft.com/en-us/library/cc731607(v=ws.10).aspx

Here is another article which lets you how to enable the security auditing of Active Directory and how to extract its events from Event Viewer.

Hope this helps!
1
compdigit44Commented:
If you have mobile users with an Exchange login actions could also be generated by  ActiveSync. Also are the user login attempts from the same devices or random. I ask since I am wondering if user are locking there desktops and have apps running in the background.
0
Tom CieslikIT EngineerCommented:
Best solution provided, no more other questions from author
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Networking

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.