Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

 

How to identify suspicious insider activity using Active Directory

In an organization, insider threats are the hardest to detect since the miscreants are trusted domain users. However, monitoring events such as user logons, critical files access, privileged accounts etc. can be used to detect suspicious user activity.

The following is a comparison between identifying suspicious activity of domain users using native auditing tools and ManageEngine's ADAudit Plus, a comprehensive real-time Active Directory auditing solution.

Download for FREE
Free, fully functional 30-day trial
  • With Native AD Auditing

  • With ADAudit Plus

  • I.LOGON ACTIVITY

  • Follow steps 1 and 2 given in the native auditing section to turn on Audit Policy and to enable logon-logoff auditing.

  • Login to ADAudit Plus web console.

  • Click on the Reports tab. From the Local logon-logoff section in the left pane, select the Logon Activity report.

    how-to-find-suspicious-activity-active-directory-5

    The Logon Activity report in ADAudit Plus shows the logon attempts, along with the username, logon time, name of the workstation, type of logon among other examples. Real-time alerting when there is a specific user logon activity when the same employee has called in sick, logon activity during non-business hours, or any other suspicious activity pre-configured by the organization's IT team is possible using ADAudit Plus.

  • II. PRIVILEGED ACCOUNT MONITORING

  • Follow steps 1 and 2 given in the native auditing section to enable audit policies.

  • Login to ADAudit Plus web console as an administrator.

  • Click on the Reports tab. From the Account Management section in the left pane, select the Administrative User Actions report.

    how-to-find-suspicious-activity-active-directory-9
  • The following are some of the important details you can obtain in one glance with this report:
    1. Username of the privileged account using which the changes were made

    2. The time when the changes were made

    3. The computer or server in which the changes were made from

    4. The description of the changes made

  • Here are some of the limitations to track suspicious activity in Active Directory using native auditing methods:
    1. It is a complex process to obtain the required data amidst the noise.

    2. It is difficult to generate the report for different time zones and date formats.

  • With ADAudit Plus, it is easy to monitor suspicious activity in Active Directory in just a few clicks.
  • I.LOGON ACTIVITY

  • Step 1: Enable Audit Policy
  • Open Server Manager on Windows server.

  • Under the Manage tab, open the Group Policy Management console.

  • Go to Forest -> Domain -> Your Domain -> Domain Controllers.

  • You can either edit an existing group policy object or create a new one.

  • In the Group Policy Editor, navigate to Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Audit Policy.

  • In Audit Policy, select 'Audit logon events' and enable 'Success' and 'Failure' auditing.

    how-to-find-suspicious-activity-active-directory-1
  • Step 2: Enable logon-logoff
  • Go back to Computer Configuration. Navigate to Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> Audit Policy -> Logon/Logoff.

  • Under that, enable Success and Failure auditing for Audit Logon, Audit Logoff, and Audit Special Logon.

  • Open the Group Policy Management console and select the GPO that you have edited or created. Under Security Filtering, add the users whose logons need to be tracked. You can also choose to audit every domain user's logon by selecting All users. To audit a group of domain users, the specific group(s) can be added.

    how-to-find-suspicious-activity-active-directory-2
  • Step 3: Use Active Directory Event Viewer to check the logs
  • Open Event Viewer and navigate to Windows logs -> Security.

  • Look for the event IDs 4624 (Account was logged on), 4634 (Account was logged off), 4647 (user initiated logoff), 4672 (special logon), 4800 (workstation was locked), and 4801 (workstation was unlocked).

    how-to-find-suspicious-activity-active-directory-3
  • Click Filter Current Log on the right side to filter the logs based on event IDs or the time range for which the information is required.

    how-to-find-suspicious-activity-active-directory-4

    System admins have to go through the list of logon times and identify suspicious patterns, if any. This is a mundane and error-prone process as there are high chances that some logs may be overlooked.

  • II. PRIVILEGED ACCOUNT MONITORING

  • Step 1: Identify the privileged user accounts.

    If a domain user satisfies one or more of the below mentioned criteria, they can be identified as privileged users.

  • Users/groups who are members of any of the administrative groups.

  • Users/groups who inherit administrative privileges through their Organizational Unit.

  • Local user accounts and service accounts that may have received administrative privileges locally on domain controllers.

  • Users who have the privileges to reset passwords and unlock the accounts of domain users.

  • Users who have administrative privileges through which they can access Service Accounts.

  • Users who have 'write' access to Group Policy Objects related to domain controllers.

  • Users who have access to any application that manages Active Directory.

  • Users who are administrators of the Virtual System Environment.

    You can list all the privileged users by using Active Directory Users and Computers and Group Policy Management Console.
  • Step 2: Enable required audit policies
  • Open Server Manager on Windows server.

  • Under the Manage tab, open the Group Policy Management console.

  • Go to Forest -> Domain -> Your Domain -> Domain Controllers.

  • You can either edit an existing group policy object or create a new one.

  • In the Group Policy Editor, navigate to Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Audit Policy.

  • The Audit Policy lists all of its sub-policies in the right panel, as shown in the Figure below.

  • Select the policies you want to enable for both its successful and failure events. In the event of multiple failures, the organization can initiate security protocol, if necessary.

  • Click Apply and OK to close Properties window.

    how-to-find-suspicious-activity-active-directory-6
  • Step 3: Configure the advanced audit policy
  • Launch Server Manager in your Windows Server instance.

  • Under Manage, select Group Policy Management to launch the Group Policy Management console.

  • Navigate to Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies.

  • Select the required Audit Policies you want to enable and select both Success and Failure events.

  • Force audit policy subcategory settings to override audit policy category settings in Group Policy to make sure that basic auditing is disabled.

    how-to-find-suspicious-activity-active-directory-7
  • Step 4: View the events using Windows Event Viewer
  • Open Event Viewer and navigate to Windows logs -> Security. You will see all the events logged in security logs.

  • Search using Find option or create a custom view to display the events generated by a specific privileged account.

    how-to-find-suspicious-activity-active-directory-8

Does native auditing become a little too much?

Simplify distribution group auditing and reporting with ADAudit Plus.

Get Your Free Trial Fully functional 30-day trial

Request 1-on-1 demo

  •  
  •  
  •  
  •  
  •  
  • -Select-
  • By clicking 'Submit' you agree to processing of personal data according to the Privacy Policy.

Thanks

One of our solution experts will get in touch with you shortly.

ADAudit Plus Trusted By