Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » How to detect who disabled a user in Active Directory

How to detect who disabled a user in Active Directory

Posted on 19/03/202008/09/2024 Christian By Christian No Comments on How to detect who disabled a user in Active Directory
detect user disablement

This method is a pretty straightforward approach when using a third-party Software to monitor the Active Directory. These tools help in mitigating challenges when it comes to managing and monitoring AD. In this article, we shall discuss how to detect who disabled a user in Active Directory. Please see how to detect if an application was uninstalled on Windows: Find out who has uninstalled an application via Windows Event Viewer, and how to find out who restarted Windows Server.

Some monitoring tools and software are as follows.

  • Data Protection Manager from Microsoft
  • Microsoft System Center Management Pack for ADDS
  • Spiceworks
  • Netwrix
  • SolarWinds Server and Application Manager
  • ManageEngine ADManager Plus
  • ManageEngine ADAudit Plus
  • Lepide Active Directory Auditor
  • Netwrix Auditor for AD
  • Quest Active Administrator
  • Varonis
  • FirstWare AD-Inspector
  • Quest Active Administrator
  • PRTG Active Directory Monitor

Many others are capable of monitoring the Active Directory environment (detect who disabled a user in Active Directory).

Determine who has disabled a user

To determine who has disabled a user using built-in Active Directory tools, follow the steps below. Launch the Group Policy Management tool

Active Directory monitoring

Create a new GPO

monitoring tools

Name the GPO whatever you desire as shown below

detect user disablement

Now edit the newly created GPO as shown below

Active Directory monitoring

Enable the Audit Policy

This will be open the “Group Policy Management Editor”
– Go to “Computer Configuration”
– Click on Policies
– Windows Settings
– Security Settings
– Local Policies and
– Audit Policy: Here on the “Audit account management”
– Define these policy settings to “Success”

monitoring tools

The result will be as shown below

software detection

Define the log Size

Next, navigate to Event Log and define the policy settings as shown below. Maximum security log size to 4194304 KB

detect user disablement

Retention method for security log to Overwrite events as needed.

monitoring tools

Next, link the new GPO to the OU with User Accounts that you want to audit
– Go to “Group Policy Management”
– Right-click the defined OU
– Choose “Link an Existing GPO”

Active Directory monitoring

Choose the GPO that you’ve created.

monitoring tools

In this way, the GPO will be linked to the OU as shown below

monitoring tools

Next, update the group policy on the Employee OU. Here are the steps to do this below

software detection

On the Group Policy Management prompt as shown below. Click on OK

detect user disablement

Fire up the ADSI Edit Tool

Active Directory monitoring

This will open the ADSI Tool and click on Connect to

monitoring tools

Connect to Default naming context

Right-click DomainDNS object with the name of your domain “Mine here is TechDirectArchive”

Click on Properties and then switch to the Security tab. Click on Advanced

This will open the “Advanced Security Settings for your domain “TechDirectArchive”. Navigate to the Auditing tab

Add User, Computer or Group etc

Add Principal “Everyone”

Click on Success “Success”. This applies to “This object and Descendant objects”.

Permissions: Select all checkboxes except the following not checked in the image below

The screenshot below is the result of the permissions assigned to everyone

Click on “ok” to close the security properties windows. To test, open the “Event Viewer”. See the Various methods to launch the Event Viewer.

Navigate to the Windows log, Security, and click on “Filter Current Log”.

Search the Security log for event ID 4725 (User Account Management task category)

This will display the number of disabled users in the Event log as performed

Also, see Viewing Scheduled Events on AW using the Command Line (CLI), and how to Query MBAM to display the BitLocker Recovery report.

FAQs

What is the process for identifying the culprit behind the deactivation of a user account in Active Directory?

Investigate the Security event logs on the domain controller by filtering for events related to user account modifications. Analyze the event entries to extract information such as the username and workstation details, providing insights into who disabled the user account and when the action occurred.

How can I track down the person who deactivated a user in Active Directory?

Utilize the Windows Event Viewer on the domain controller to review security logs. Filter for events associated with user account modifications, focusing on the event details to ascertain the identity of the person who disabled the user account and the system used to act.

Are there specific logs or events I should check to identify the culprit behind a user account disablement in Active Directory?

review the Security logs on the Domain Controller, and pay attention to Event ID 4725. This event provides comprehensive information, allowing you to determine the user who was disabled and the entity responsible for the action.

I hope you found this article useful on How to detect who disabled a user in Active Directory. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Event Viewer, eventlog, Microsoft Windows, Monitoring, Monitoring tool, Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: How to find disabled Active Directory User accounts
Next Post: How to check if homebrew is installed on macOS

Related Posts

  • wsus logo e1653651564255
    How to configure Windows server update services Windows Server
  • ddf
    How to configure Windows Deployment Services on Windows Server Windows Server
  • Create Windows Defender Firewall Rule
    Fix Windows defender blocked incoming connection on Windows Network | Monitoring
  • Screenshot 2021 03 16 at 21.14.05
    Unable to locate the account: Fix call to DsGetDcNameWithAccount failed with return value 0x0000054B Windows Server
  • article 1280x720.192a2586 1
    How to apply Windows Updates from WSUS to AWS Instances AWS/Azure/OpenShift
  • connect to RDP automatically
    RDP Configuration Settings: Connect automatically to RDP session Windows

More Related Articles

wsus logo e1653651564255 How to configure Windows server update services Windows Server
ddf How to configure Windows Deployment Services on Windows Server Windows Server
Create Windows Defender Firewall Rule Fix Windows defender blocked incoming connection on Windows Network | Monitoring
Screenshot 2021 03 16 at 21.14.05 Unable to locate the account: Fix call to DsGetDcNameWithAccount failed with return value 0x0000054B Windows Server
article 1280x720.192a2586 1 How to apply Windows Updates from WSUS to AWS Instances AWS/Azure/OpenShift
connect to RDP automatically RDP Configuration Settings: Connect automatically to RDP session Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Entire VM restore
    Restore VM to Original location using Veeam Entire VM restore Backup
  • Capture 12
    How to Generate SSH Keys in Windows 10 Windows
  • hyper v 1
    How to fix unable to create a new VM on HyperV Virtualization
  • Connect to FTP Server
    Secure FTP Login Issue: NAT Router Configuration for Passive Mode and Port Forwarding Windows Server
  • Slide1 3
    Azure Virtual Networks: Preparing Azure and On-Premises Virtual Networks with Azure CLI Commands AWS/Azure/OpenShift
  • settings app not working featured 800x400 1
    How to search through the Windows registry Windows Server
  • nonexistent AD
    Fix Active Directory Domain Controller (AD DS) for this domain could not be contacted Windows Server
  • Spell Check Not Working in Microsoft Word
    How to Fix Spell Check Not Working in Microsoft Word Microsoft Exchange/Office/365

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,823 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.