Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

Get Quote

The first step in tracking logon and logoff events is to enable auditing. You can tell Windows the specific set of changes you want to monitor so that only these events are recorded in the security log.

To check user login history in Active Directory, enable auditing by following the steps below:

  • 1 Run gpmc.msc (Group Policy Management Console). 
  • 2 Create a new GPO.
  • 3 Click Edit and navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies. Under Audit Policies, you'll find specific settings for Logon/logoff and Account Logon.
    Logon/logoff:
    • Audit Logon > Define > Success and Failure.
    • Audit Logoff > Define > Success.
    • Audit Other Logon/Logoff Events > Define > Success.
    Account Logon:
    • Audit Kerberos Authentication Service > Define > Success and Failure.
  • 4 To link the new GPO to your domain, right-click  . Select Link an Existing GPO and choose the GPO that you created.

By default, Windows updates Group Policy every 90 minutes; if you want the changes to be reflected immediately, you can force a background update of all Group Policy settings by executing the following command in the Windows Command Prompt:

gpupdate /force

Now, when any user logs on or off, the information will be recorded as an event in the Windows security log.

To view the events, open Event Viewer and navigate to Windows Logs > Security. Here you'll find details of all events that you've enabled auditing for. You can define the size of the security log here, as well as choose to overwrite older events so that recent events are recorded when the log is full.

Track user logon logoff active directory

Understanding event IDs associated with logon and logoff activity.

  • Event ID 4624 - An account was successfully logged on.

    This event records every successful attempt to log on to the local computer. It includes critical information about the logon type (e.g. interactive, batch, network, or service), SID, username, network information, and more. Monitoring this particular event is crucial as the information regarding logon type is not found in DCs.

  • Event ID 4634 - An account was logged off.

    This event signals the end of a logon session.

  • Event ID 4647 - User initiated logoff.

    This event, like event 4634, signals that a user has logged off; however, this particular event indicates that the logon was interactive or RemoteInteractive (remote desktop).

  • Event ID 4625 - An account failed to log on.

    This event documents every failed attempt to log on to the local computer, including information on why the logon failed (bad username, expired password, expired account, etc.) which is useful for security audits.

    All the event IDs mentioned above have to be collected from individual machines. If you're not concerned with the type of logon or when users log off, you can simply track the following event IDs from your DCs to find users' logon history.

  • Event ID 4768 - A Kerberos authentication ticket (TGT) was requested.

    This event is generated when the DC grants an authentication ticket (TGT). That means a user has entered the correct username and password, and their account passed status and restriction checks. If the ticket request fails (account is disabled, expired, or locked; attempt is outside of logon hours; etc.), then this event is logged as a failed logon attempt.

  • Event ID 4771 - Kerberos pre-authentication failed.

    This event means that the ticket request failed, so this event can be considered a logon failure.

You probably noticed that logon and logoff activity are denoted by different event IDs. To tie these events together, you need a common identifier.

The logon ID is a number (unique between reboots) that identifies the most recently initiated logon session. Any subsequent activity is reported with this ID. By associating logon and logoff events with the same logon ID, you can calculate the logon duration.

Limitations of native auditing tools.

  • All local logon and logoff-related events are only recorded in the security log of individual computers (workstations or Windows servers) and not on the domain controllers (DCs).
  • Logon events recorded on DCs do not hold information sufficient to distinguish between the various logon types, namely, Interactive, Remote Interactive, Network, Batch, Service, etc.
  • Logoff events are not recorded on DCs. This information is vital in determining the logon duration of a particular user.

This means you have to collect information from DCs as well as workstations and other Windows servers to get a complete overview of all logon and logoff activity within your environment. The process is painstaking and could quickly get frustrating.

An easier way to audit logon activity.

So, what if there was an easier way to audit logon activity? A tool like ADAudit Plus audits specific logon events as well as current and past logon activity to provide a list of all logon-related changes.

With ADAudit Plus, you can instantly view reports on 
  • User logon history
  • Domain controller logon history
  • Windows server logon history
  • Workstation logon history

This information is provided on an easily understandable web interface that displays statistical information through charts, graphs, and a list view of canned and customized reports.


User logon activity report

User logon activity report

   User logon activity report


Active directory audit logon failure
ADAudit Plus is a web-based, real-time Active Directory change auditing tool that helps you,

To learn more about how ADAudit Plus can help you with all your Active Directory auditing needs, please visit: here

Keeping track of your users' login activity is critical in detecting potential insider threats and security breaches.

The steps above answer the following login monitoring questions:

Native auditing becoming a little too much?

Try ADAudit Plus login monitoring tool to audit, track, and respond to malicious login and logoff actions instantaneously.

Try ADAudit Plus for free
 

ADAudit Plus Trusted By

A single pane of glass for complete Active Directory Auditing and Reporting