当前位置:网站首页>How do I audit Active Directory User account changes?
How do I audit Active Directory User account changes?
2022-06-29 20:27:00 【Xiao Deng in operation and [ema】
As in IT Part of the environment that manages security and compliance , Audit and follow up AD All changes that occur in domain user accounts are critical . There are some important changes in user accounts , You must consider auditing all... Related to user accounts AD Domain events , To identify and prevent potential security threats . Some of these events are creating new user accounts 、 Delete user account 、 Enable / Disable user accounts 、 User account permission change, etc . Through continuous monitoring Active Directory Changes made to user accounts in ( Some of them may be unauthorized or negligent ), You can overcome potential in the future AD Domain security vulnerability .

Uploading … Re upload cancel
Security vulnerabilities
Use this machine Active Directory Audit tools
First use the steps mentioned below to enable “ User account management ” Audit strategy .
① go to “ Management tools ”
② From the main “ domain controller ”, open “ Group policy management ” Console
③ Create a new GPO Or edit an existing GPO. It is recommended to create a new GPO, Link it to the domain and edit it .
④ In the left panel , Create a new by right clicking on the domain name GPO.
⑤ single click “ Create... In this domain GPO, And link here ”.
⑥ Displayed on the screen “ newly build GPO” Window , Give me a name ( for example : Manage user accounts ), And then click “ determine ”.
⑦ Right click the new... That appears in the left pane GPO, Click... In the context menu “ edit ”.
⑧ It will then be displayed on the screen “ Group policy management editor ”.
⑨ go to “ Computer configuration ”*“Windows Set up ”*“ Security Settings ”*“ Advanced audit policy configuration ”*“ Audit strategy ” Set up “ Audit user account management ” Strategy .
⑩ choice “ Account management ” Strategy , The policy will display all its sub policies .
⑪ double-click “ Review user account management ” Policy to open its “ attribute ” window .
Be careful : stay “ Advanced audit policy configuration ” instead of “ The local policy ” Configure the above policy in , Because you need to “ The local policy ” Enabling all account management policies in generates a large number of event logs .
⑫Active Directory Review policy account management
In policy properties , choice “ Define these policy settings ” Check box . According to your audit attempts , Select any one or both options ( Success and failure ).
⑬ to examine AD Domain account management properties
⑭ single click “ application ”, And then click “ determine ” Close the properties window .
⑮ Update group policy directly to reflect new changes across the domain
⑯ stay “ Command prompt ” Run the following command in :GP to update / mandatory

Audit strategy
The above is to enable “ User account management ” Specific steps of audit strategy , But just because AD The audit policy carried by the domain itself is not enough to efficiently audit the behavior of users in the domain , So at present, many enterprises are using third-party tools to AD Domain for auditing . Next, I'd like to introduce to you one from Zhuohao AD Domain audit tools ——ADAudit Plus

User behavior monitoring
Zhuohao's ADAudit Plus Is a AD Domain change audit and reporting software , It can AD Track the behavior of users in the domain , Analyze user behavior through various reports generated . Abnormal behavior or malicious operation is found , Real time alarm , Let the user behavior in the domain be truly visualized . The audit of network compliance is very helpful . Compared with the past, the administrator reviews the behavior of users in the domain through the domain controller ,ADAudit Plus It not only increases the review efficiency , It can also analyze the related events in the domain , Thoroughly and effectively audit various behaviors of domain users .

ADAudit Plus
The standardization of enterprise network user behavior is very important to network information security , Therefore, the audit of user behavior is inevitable . It is not only of great help to network information security , It also provides important support for the audit of enterprise network compliance .
版权声明
本文为[Xiao Deng in operation and [email protected]]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/180/202206292018551898.html
边栏推荐
- 【译】十二因子应用(四)
- Flume configuration 4 - Custom source+sink
- Koa source code analysis
- jfinal中如何使用过滤器监控Druid监听SQL执行?
- AI scene Storage Optimization: yunzhisheng supercomputing platform storage practice based on juicefs
- Flume-ng配置
- [notes] take notes again -- learn by doing Verilog HDL – 008
- Is it safe to open a new bond Online
- Flume配置1——基础案例
- 一次 Keepalived 高可用的事故,让我重学了一遍它!
猜你喜欢

【Try to Hack】vulnhub narak

Flume configuration 1 - basic case

Linux安装MySQL5
![[compilation principle] type check](/img/fc/458871e2df4e0384f65e09faa909d7.png)
[compilation principle] type check

JMeter BeanShell explanation and thread calling

Hangfire详解

Flume configuration 3 - interceptor filtering

Lock4j -- distributed lock Middleware -- customize the logic of lock acquisition failure

AI scene Storage Optimization: yunzhisheng supercomputing platform storage practice based on juicefs

文件包含漏洞
随机推荐
输入年份与月份,求该月共有多少天
[fishing artifact] code tool for lowering the seconds of UI Library -- form part (I) design
Flume理论
「运维有小邓」日志分析工具使用越来越频繁的原因
proxmox集群节点崩溃处理
60 days of remote office experience sharing | community essay solicitation
18. `bs object Node name next_ sibling` previous_ Sibling get sibling node
[compilation principle] syntax analysis
thinkphp5中的配置如何使用
A Japanese Cherry sold at a sky high price of 1980 yuan. Netizen: I feel cheated after eating it
Measures to support the development of advanced manufacturing industry in Futian District of Shenzhen in 2022
2021 CCPC Harbin E. power and modulo (thinking questions)
Is it safe to open an account with flush for stock trading?
In depth good article | yolov5+deepsort multi-target tracking in-depth interpretation and testing (including source code)
深入Go底层原理,重写Redis中间件实战无密
Startservice() procedure
2022年深圳市福田区支持先进制造业发展若干措施
jfinal中如何使用过滤器监控Druid监听SQL执行?
Mapbox GL development tutorial (12): loading surface layer data
Hangfire details