{"id":6753,"date":"2019-01-21T13:57:44","date_gmt":"2019-01-21T13:57:44","guid":{"rendered":"https:\/\/www.vyapin.com\/blog\/?p=6753"},"modified":"2021-05-11T07:59:48","modified_gmt":"2021-05-11T07:59:48","slug":"how-to-audit-active-directory-user-accounts-changes","status":"publish","type":"post","link":"https:\/\/www.vyapinsoftware.com\/blog\/how-to-audit-active-directory-user-accounts-changes","title":{"rendered":"How to Audit Active Directory User Accounts Changes?"},"content":{"rendered":"<p>As part of managing security and compliance in your IT environment, it is vital to <strong>audit and track all the changes happening in AD user accounts<\/strong>. There are a few important changes in user accounts you must consider auditing all AD events related to user accounts to identify and prevent potential security threats. Some of these events are new user accounts created, user accounts deleted, user accounts enabled \/ disabled, user accounts permissions changes, etc. By constantly monitoring changes (some of which may be unauthorized or by oversight) made to user accounts in Active Directory, you can overcome <strong>potential AD security breaches<\/strong> in the future.<\/p>\n<blockquote><p>Here we have discussed about <strong>how to audit user account changes in AD<\/strong> using native Active Directory auditing tool and with <a href=\"https:\/\/www.vyapinsoftware.com\/products\/active-directory-auditing-tool\"><strong>Vyapin Active Directory Change Tracker<\/strong><\/a>.<\/p><\/blockquote>\n<h2>Using Native Active Directory Auditing Tool<\/h2>\n<p>First enable \u201cUser Account Management\u201d audit policy using the steps mentioned below.<\/p>\n<ol>\n<li>Go to \u201cAdministrative Tools\u201d<\/li>\n<li>From primary \u201cDomain Controller\u201d, open \u201cGroup Policy Management\u201d console<\/li>\n<li>Create a new GPO or edit an existing GPO. Creating a new GPO, link it to domain and edit is recommended.<\/li>\n<li>From left panel, create a new GPO by right-clicking on the domain name.<\/li>\n<li>Click \u201cCreate a GPO in this domain, and Link it here\u201d.<\/li>\n<li>On \u201cNew GPO\u201d window shown on the screen, give a name (Say: Manage User Accounts) and click \u201cOK\u201d.<\/li>\n<li>Right-click on the new GPO which appears in left pane click \u201cEdit\u201d in the context menu.<\/li>\n<li>It will show \u201cGroup Policy Management Editor\u201d on the screen.<\/li>\n<li>Go to \u201cComputer Configuration\u201d \u2794 \u201cWindows Settings\u201d \u2794 \u201cSecurity Settings\u201d \u2794 \u201cAdvanced Audit Policy Configuration\u201d \u2794 \u201cAudit Policies\u201d to set \u201cAudit User Account Management\u201d policy.<\/li>\n<li>Choose \u201cAccount Management\u201d policy which will display all its sub-policies.<\/li>\n<li>Double-click \u201cAudit User Account Management\u201d\u2019 policy to open its \u201cProperties\u201d window.<\/li>\n<\/ol>\n<p><strong>Note:<\/strong>\u00a0Configuring above policy in \u201cAdvanced Audit Policy Configuration\u201d rather than \u201cLocal Policy\u201d because the need of enabling all account management policies in \u201cLocal Policy\u201d will create huge amount of event logs.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-audit-policy-account-management.png\" data-lbwps-width=\"679\" data-lbwps-height=\"485\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-audit-policy-account-management-300x214.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6754 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-audit-policy-account-management.png\" alt=\"Active Directory audit policy account management\" width=\"679\" height=\"485\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-audit-policy-account-management.png 679w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-audit-policy-account-management-300x214.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-audit-policy-account-management-624x446.png 624w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/a><\/p>\n<ol start=\"12\">\n<li>In policy properties, select \u201cDefine these policy settings\u201d checkbox. As per your auditing attempt requirements, choose any one or both the options (success &amp; failure).<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6755\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/audit-ad-account-management-properties.png\" alt=\"Audit AD account management properties\" width=\"213\" height=\"224\" \/><\/p>\n<ol start=\"13\">\n<li>Click \u201cApply\u201d, and \u201cOK\u201d to close the properties window.<\/li>\n<li>Straightway update the Group Policy to reflect the new changes on the entire domain<\/li>\n<li>Run the following command in the \u201cCommand Prompt\u201d:<\/li>\n<\/ol>\n<p><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Gpupdate \/force<\/em><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6756\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/ad-group-policy-update-using-command-prompt.png\" alt=\"AD group policy update using command prompt\" width=\"677\" height=\"342\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/ad-group-policy-update-using-command-prompt.png 677w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/ad-group-policy-update-using-command-prompt-300x152.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/ad-group-policy-update-using-command-prompt-624x315.png 624w\" sizes=\"auto, (max-width: 677px) 100vw, 677px\" \/><\/p>\n<p>Once \u201cUser Account Management\u201d audit policy is enabled, you can track all the user account changes in AD through event viewer. We have explained how to audit AD user account changes via event viewer.<\/p>\n<h3>Monitoring user account changes in AD using Event Viewer<\/h3>\n<p>To track Active Directory user account changes,<\/p>\n<ul>\n<li>Open \u201cWindows Event Viewer\u201d<\/li>\n<li>Go to \u201cWindows Logs\u201d \u2794 \u201cSecurity\u201d<\/li>\n<li>In the right pane, click \u201cFilter Current Log\u201d option to list the relevant events<\/li>\n<\/ul>\n<p><strong>Given below are few events related to user account management:<\/strong><\/p>\n<ul>\n<li>Event ID 3452: A user account was created.<\/li>\n<li>Event ID 3456: A user account was deleted.<\/li>\n<li>Event ID 3461: A user account was enabled.<\/li>\n<li>Event ID 3466: A user account was disabled.<\/li>\n<li>Event ID 3468: A user account was changed.<\/li>\n<li>Event ID 3471: The name of an account was changed.<\/li>\n<li>Event ID 3475: A user account was locked out.<\/li>\n<\/ul>\n<h2>Using Vyapin Active Directory Change Tracker<\/h2>\n<p>Events Reports in ADChangeTracker is a powerful feature that enables the user to report the events data for <strong>AD object changes, User logon\/logoff activities, Password change activities and Terminal Services activities<\/strong> based on specific event ID(s) in the security event log of domain controller. You can view events data by specifying the timestamp, domain, change type, category and field based filter query that occurred over a time period.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-permissions-changes-report.png\" data-lbwps-width=\"638\" data-lbwps-height=\"330\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-permissions-changes-report-300x155.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6757 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-permissions-changes-report.png\" alt=\"Active Directory permissions changes report\" width=\"638\" height=\"330\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-permissions-changes-report.png 638w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-permissions-changes-report-300x155.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2019\/01\/active-directory-permissions-changes-report-624x323.png 624w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/a><\/p>\n<h3><strong>Benefits<\/strong><\/h3>\n<ul>\n<li>Reports <strong>User Logon\/Logoff activities<\/strong> in a domain with valuable information like Client Name, Logon Type and Workstation Name.<\/li>\n<li>Reports events data with <strong>When and Who made the changes<\/strong> for Password change activities in Active Directory.<\/li>\n<li>Reports <strong>Terminal Services Activities<\/strong> of roaming users in a domain with valuable information like Connected User Name, Workstation Name and Session Type.<\/li>\n<li>Reports <strong>What exactly changed<\/strong>, along with Old Value and New Value, <strong>When the change was made, Where the change was made<\/strong> in Active Directory and <strong>Who made the changes<\/strong> in Active Directory objects.<\/li>\n<\/ul>\n<blockquote>\n<h2 style=\"text-align: center;\">Try Vyapin <strong><a href=\"https:\/\/www.vyapinsoftware.com\/products\/active-directory-auditing-tool\">Active Directory Change Tracking Tool<\/a><\/strong> Now!<\/h2>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>As part of managing security and compliance in your IT environment, it is vital to audit and track all the changes happening in AD user accounts. There are a few important changes in user accounts you must consider auditing all AD events related to user accounts to identify and prevent potential security threats. Some of [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":6754,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[20,21],"class_list":["post-6753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-active-directory-audit-and-reporting","tag-active-directory-auditing","tag-active-directory-reporting"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/6753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/comments?post=6753"}],"version-history":[{"count":8,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/6753\/revisions"}],"predecessor-version":[{"id":7801,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/6753\/revisions\/7801"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/media\/6754"}],"wp:attachment":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/media?parent=6753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/categories?post=6753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/tags?post=6753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}