Skip to content
TeckLyfe

TeckLyfe

We're your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To's.

  • Home
  • InfoSec
    • Server Hardening
    • Attacks
    • Malware
    • Pentest
    • Phishing
    • Ransomware
    • Virus
    • Zero-Day
  • SysAdmin
    • Cisco
    • Linux
    • Mac
    • Windows
  • Tech
    • Apps
    • Gadgets
    • Gaming
    • Internet
    • Mobile
      • Smartphone
    • OS
    • Tech Tips
  • Follow Us
    • Facebook
    • X aka Twitter
    • LinkedIn
    • YouTube
    • Reddit
    • RSS Feed
  • Home
  • Technology
  • Tech Tips
  • How To Detect Who Disabled A User Account In Active Directory
System Administration Tech Tips

How To Detect Who Disabled A User Account In Active Directory

October 29, 2015October 16, 2016 rbrussell82
Share This:

tip-of-the-dayThe method below works well for Windows Server 2008 and later. If a user has been deleted from the Active Directory, they won’t be able to log into the systems using Windows Authentication. Setting up security logs with a history can help you identify who disabled a user account.

1) Configure Audit Settings

Run gpedit.msc → Create a new GPO → Edit it → Go to “Computer Configuration” → Policies → Windows Settings → Security Settings → Local Policies > Audit Policy:
Audit account management → Define → Success.

2) Configure Event Log Settings

Go to Event Log → Define:
Maximum security log size to 4GB
Retention method for security log to Overwrite events as needed.

3) Assign a Group Policy to an OU

Link the new GPO to OU with User Accounts → Go to “Group Policy Management” → Right-click the defined OU → Choose “Link an Existing GPO” → Choose the GPO that you’ve created.

Force the group policy update → In “Group Policy Management” → Right-click the defined OU → Click on “Group Policy Update”.

4) Configure ADSI Edit

Open ADSI Edit → Connect to Default naming context → Right-click DomainDNS object with the name of your domain → Properties → Security (Tab) → Advanced (Button) → Auditing (Tab) → Add Principal “Everyone” → Type “Success” → Applies to “This object and Descendant objects” → Permissions → Select all check boxes except the following:
Full Control
List Contents
Read all properties
Read permissions > Click “OK”.

5) Filter Event Viewer

Open Event viewer and search Security log for event ID’s 4725 (User Account Management task category).

active directory, delete user account, sysadmin, tech tip

Related Posts

Wordpress WP-Cron
Tech Tips

Fix WordPress WP-Cron 403 Errors When Using Cloudflare

January 2, 2025 rbrussell82
Microsoft Edge
Apps Internet Tech Tips

How to Make Microsoft Edge More Privacy Friendly

February 7, 2024 rbrussell82

Post navigation

Previous: KB3105208 causing BSOD on some devices running latest Windows 10 Insider Preview
Next: Disable Automatic Updates and Reboots in Windows 10
  • About Us
  • Privacy Policy
  • Advertise With Us
  • Contact Us
We’re your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To’s.

Founded in 2000, TeckLyfe is based in Chicago, IL. Reproduction without explicit permission is prohibited.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
© 2000-2025 - TeckLyfe.com - All Rights Reserved. Reproduction without explicit permission is prohibited.