Tag: Active Directory audit
November 3, 2022 |
Active Directory Attributes: Last Logon
Active Directory user objects possess a number of logon metadata attributes that are valuable for Active Directory audit reporting and administration. For example, they are commonly used to identify user accounts that have been inactive for a significant period, or as “stale”...
April 21, 2021 |
Active Directory Auditing Guidelines
Active Directory provides account management, authentication and authorization services that are critical for strong access governance. Accordingly, proper Active Directory auditing is essential for both cybersecurity and compliance with regulations that require strong access management.
For...
March 23, 2016 |
How to Detect Who Deleted a Group Policy Object
Group Policy Objects (GPOs) can provide configurations for access to shared resources and devices, enable critical functionalities or establish secure environments. If some of the GPOs are deleted, users may not be able to access the Internet, modify their data, use peripherals or even log in to...
January 15, 2016 |
How to Get User Logon Session Times from the Event Log
If you’re a knowledge worker, to be productive in a work environment, you’re probably going to need a user account. And you’re probably going to need to actually use this user account to login to your office and mobile devices. If you don’t, you’re probably not going to be working at that...
November 11, 2013 |
Best Practices for Change Management in the Data Center
When it comes to change management, Scott Matteson gets it. Too many companies today make changes without any kind of change management in place. Scott's approach even includes the mandated use of individual accounts to perform changes so that Auditing of system changes can easily be tied back to...
November 7, 2013 |
Death by Event Log Overload
When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can be found in Event Logs.
So, if companies today already have all necessary data that points...
October 18, 2013 |
Top 6 Security Breaches that Auditing Would have Prevented
Because IT security breaches have become so prevalent, the common model for addressing them is often more reactive than proactive. Have you given up and given in to the idea that breaches are inevitable? Money, time and effort is put into establishing incident response teams, but often preventative...
October 19, 2012 |
Intrusive agents will cause audit failures
Over the past several months I have had the pleasure of speaking with many customers who are looking to switch out their existing auditing platform for Netwrix Change Reporter Suite. They are most concerned about continuity of auditing over their critical systems to look for changes that may affect...
July 17, 2012 |
Interpreting Active Directory audit data, not so simple!
It had been a while since I needed to comb through event logs to figure out some change in Active Directory. Having just joined Netwrix, I thought it may be a good idea to spend some time reviewing Windows auditing and in particular What's New Windows Server with AD DS (Domain Services) logging. I...
June 6, 2011 |
Case Study: Eclipse Group Automates Infrastructure Change Auditing for Increased Security
With over 200 IT pros serving a wide variety of business needs, Eclipse Group offers a broad range of IT services and systems geared toward providing top-quality application development, infrastructure management, disaster recovery, risk management, modernization and more for IT departments across...