Active Directory Monitring.

Hi,

Please is there any power shell script or command can find on AD security group who has add as member and who made the changes. I have recently join an org over 4k employees, and managing  the infrastructure.
how I can enable the AD security logs for future  for analyses. any command to find the bad DHCP IP address.

Help

Regards
Asif
Asif NaeemInfrastructure EngineerAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

arnoldCommented:
Gpo enable auditing if not already, it will record the event in the security event viewer on the DCs

Not sure what you mean about bad DHCP ip.
You mean a rogue DHCP server on the network?
Broadcasting a dhcpdiscovery and then looking at the responses ....
1

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Asif NaeemInfrastructure EngineerAuthor Commented:
Hi,

Yes your right rogue DHCP IP address and DHCP flooding event log with no IP Scope event 1363 10200 as well.

I am keen any power shell script to find out who made changes in security group. getting pressure from Head of IT to answer his query.

Regards
Asif
0
Asif NaeemInfrastructure EngineerAuthor Commented:
event log is full of EVENT ID 1363 and 1020 what is the best practice to find out the solution, because there are almost 50 Scopes has been active with in DHCP, the reason we have more then 100 distribution.

Please advice.

Regards
0
ON-DEMAND: 10 Easy Ways to Lose a Password

Learn about the methods that hackers use to lift real, working credentials from even the most security-savvy employees in this on-demand webinar. We cover the importance of multi-factor authentication and how these solutions can better protect your business!

arnoldCommented:
first make sure the auditing is enabled on the default domain policy. Then Scan through the group memberships mapping users who have rights.
then you may have to scan through the delegated rights to see whether there are groups to whom those rights are delegated..

If auditing was not enabled it and if there are multiple people who have access to a single administrative login, asking it the only way to know, or talk to the user who was granted those rights to see with whom they spoke about an issue that lead to the granting of the rights.......
1
masnrockCommented:
Basically you're only going to only be able to look forward without audit logs. Arnold addressed that in his comments.

Enable logging and decide whether you want to go with PowerShell or a tool like AdAudit Plus. Might even look into SIEM for broader purposes.
1
Asif NaeemInfrastructure EngineerAuthor Commented:
Thanks provided info from all participate is really helpful.  i am working on it now.
0
Sara TeasdaleCommented:
I would suggest the Active Directory Monitoring Software which monitor the state of their AD including replication, user lockouts etc.  Please checkout the below link.

https://www.site24x7.com/active-directory-monitoring.html
1
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Powershell

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.