Enforce user logon restrictions

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Object Access » Enforce user logon restrictions

A brief look a configuring 'Enforce user logon restrictions' policy

The Enforce user logon restrictions policy setting determines whether the Key Distribution Center (KDC) in the Kerberos V5 protocol authenticates every request for a session ticket against the user rights policy associated with a user account. This validation is optional because validating each request is time-consuming and can slow down network access to services.

The possible values for this Group Policy setting are:

  • Enabled
  • Disabled
  • Not defined

On disabling this setting, users will be given access to session tickets for services they don't have permissions to use. So, it is recommended that this policy be enabled.

You can find the policy settings at Computer Configuration > Windows Settings>Security Settings > Account Policies > Kerberos Policy

Enabling the policy setting

Client devices receive a fresh configuration when the next scheduled and successful Group Policy refresh occurs. To enforce these new settings, you'll need to run the following command in a command prompt: gpupdate/force. On the local device, the Security Configuration Engine will refresh this setting in about five minutes.

About ADAudit Plus

ADAudit Plus is a real time change auditing software that helps keep your Active Directory, Azure AD, Windows file servers, NetApp filers, EMC file systems, Synology file systems, Windows member servers, and workstations secure and compliant. With ADAudit Plus, you can get visibility into:

  • Authorized and unauthorized AD management changes
  • User logons, logoffs, and account lockouts
  • GPO changes
  • Group attribute and membership changes
  • OU changes
  • Privileged access and permission changes
  • Azure AD logons, and changes to roles, groups, and applications
  • PowerShell scripts and modules

among other things.

There are more than 200 event-specific reports, and you can configure instant email alerts. You can also export the reports to XLS, HTML, PDF and CSV formats to assist in interpretation and forensics. For more information on ADAudit Plus, visit: https://www.manageengine.com/active-directory-audit/.