Support Get Quote

Active Directory Log Monitoring

Monitor Active Directory Logs with EventLog Analyzer

Active Directory forms the core part of the Microsoft Windows domain administration. It is a very critical component, as the failure of it may disrupt the entire network. When the directory service fails, the details are promptly recorded in the logs. If the logs are analyzed thoroughly, the root cause of the failure can be found. Any operation on the Active Directory objects has to be captured. The Active Directory operations on directory service object and replica source naming context directly affects the user accesses and operations of machines in the network. Thus, monitoring Active Directory log events is critical to ensure smooth functioning of networks.

EventLog Analyzer can monitor Active Directory logs and any specific failure incident can be tracked in real-time. With this, it can alert the network administrator instantly, so that remedial measures can be taken swiftly to avoid network failure.

It has the flexibility to create custom reports to monitor Active Directory specific events. The respective event IDs of Active Directory can be monitored.

Active Directory dashboard


AD Events

Ensure that logging is enabled for Active Directory events and it is not filtered by the event filter of EventLog Analyzer.


A short description of Active Directory

Active Directory is a directory service of Microsoft Windows domain networks. It forms part of the Windows Server operating system. Server which run Active Directory are called Domain Controllers. It provides administrators with centralized administration and security of network. It authenticates and authorizes all users and computers in a Windows network domain. It assigns and enforces security policies on all computers. It uses Lightweight Directory Access Protocol (LDAP). The logs of Active Directory is stored in the Event Viewer of Windows OS.

Active Directory related Event IDs

The Windows Server 2000 and 2003 event IDs for Directory service

Windows 565 - Object Open (Active Directory)
Windows 566 - Object Operation (W3 Active Directory)

The Windows Server 2008 event IDs for Directory service

Windows 4661 - A handle to an object was requested
Windows 4662 - An operation was performed on an object
Windows 4928 - An Active Directory replica source naming context was established
Windows 4929 - An Active Directory replica source naming context was removed
Windows 4930 - An Active Directory replica source naming context was modified
Windows 4931 - An Active Directory replica destination naming context was modified
Windows 4932 - Synchronization of a replica of an Active Directory naming context has begun
Windows 4933 - Synchronization of a replica of an Active Directory naming context has ended
Windows 4934 - Attributes of an Active Directory object were replicated
Windows 4935 - Replication failure begins
Windows 4936 - Replication failure ends
Windows 4937 - A lingering object was removed from a replica
Windows 5136 - A directory service object was modified
Windows 5137 - A directory service object was created
Windows 5138 - A directory service object was undeleted
Windows 5139 - A directory service object was moved
Windows 5141 - A directory service object was deleted

Other features

Log management

Centrally manage log data from sources across the network. Get predefined reports and real-time alerts that help meeting the security, compliance, and operational needs.

IT compliance management

Comply with the stringent requirements of regulatory mandates viz., PCI DSS, FISMA, HIPAA, and more with predefined reports & alerts. Customize existing reports or build new reports to meet internal security needs.

Application log management

Analyze application log from IIS and Apache web servers, Oracle & MS SQL databases, DHCP Windows and Linux applications and more. Mitigate application security attacks with reports & real-time alerts.

Syslog server management

EventLog Analyzer collects and analyzes log data from Linux/Unix servers to provide on-the-fly reports that help detecting suspicious behaviors, anomalous syslog activities, and more.

Print Server Management

Monitor and audit print server with detailed reports on documents printed, attempts to print documents without proper permission, failed print jobs and their causes, and more.

Log forensic analysis

Perform in-depth forensic analysis to backtrack attacks and identify the root cause of incidents. Save search queries as alert profile to mitigate future threats.

Need Features? Tell Us
If you want to see additional features implemented in EventLog Analyzer, we would love to hear. Click here to continue

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

A Single Pane of Glass for Comprehensive Log Management