Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » How to detect who disabled a user in Active Directory
  • Burn ISO on MAC   Proxmox installation
    Create a bootable USB on Mac: Proxmox VE Setup Virtualization
  • Windows Admin Center Apply Update
    How to Apply and Enable Automatic Windows Admin Center Update Windows
  • Trellix MVISOSN
    How to install Trellix MVISON Endpoint Security | Vulnerability Scans and Assessment
  • banner 3
    How to Set Network Adapter Priority on Windows 11 Network | Monitoring
  • Set a Resource Delete Lock
    How to Add a Delete Lock on Azure Resources AWS/Azure/OpenShift
  • SU
    How to switch users in Linux Linux
  • adfs
    Guide on federating ADFS with Azure Active Directory AWS/Azure/OpenShift
  • Update proxmox package database
    Resolve the Update Package Database failure on Proxmox VE Virtualization

How to detect who disabled a user in Active Directory

Posted on 19/03/202008/09/2024 Christian By Christian No Comments on How to detect who disabled a user in Active Directory
detect user disablement

This method is a pretty straightforward approach when using a third-party Software to monitor the Active Directory. These tools help in mitigating challenges when it comes to managing and monitoring AD. In this article, we shall discuss how to detect who disabled a user in Active Directory. Please see how to detect if an application was uninstalled on Windows: Find out who has uninstalled an application via Windows Event Viewer, and how to find out who restarted Windows Server.

Some monitoring tools and software are as follows.

  • Data Protection Manager from Microsoft
  • Microsoft System Center Management Pack for ADDS
  • Spiceworks
  • Netwrix
  • SolarWinds Server and Application Manager
  • ManageEngine ADManager Plus
  • ManageEngine ADAudit Plus
  • Lepide Active Directory Auditor
  • Netwrix Auditor for AD
  • Quest Active Administrator
  • Varonis
  • FirstWare AD-Inspector
  • Quest Active Administrator
  • PRTG Active Directory Monitor

Many others are capable of monitoring the Active Directory environment (detect who disabled a user in Active Directory).

Determine who has disabled a user

To determine who has disabled a user using built-in Active Directory tools, follow the steps below. Launch the Group Policy Management tool

Active Directory monitoring

Create a new GPO

monitoring tools

Name the GPO whatever you desire as shown below

detect user disablement

Now edit the newly created GPO as shown below

Active Directory monitoring

Enable the Audit Policy

This will be open the “Group Policy Management Editor”
– Go to “Computer Configuration”
– Click on Policies
– Windows Settings
– Security Settings
– Local Policies and
– Audit Policy: Here on the “Audit account management”
– Define these policy settings to “Success”

monitoring tools

The result will be as shown below

software detection

Define the log Size

Next, navigate to Event Log and define the policy settings as shown below. Maximum security log size to 4194304 KB

detect user disablement

Retention method for security log to Overwrite events as needed.

monitoring tools

Next, link the new GPO to the OU with User Accounts that you want to audit
– Go to “Group Policy Management”
– Right-click the defined OU
– Choose “Link an Existing GPO”

Active Directory monitoring

Choose the GPO that you’ve created.

monitoring tools

In this way, the GPO will be linked to the OU as shown below

monitoring tools

Next, update the group policy on the Employee OU. Here are the steps to do this below

software detection

On the Group Policy Management prompt as shown below. Click on OK

detect user disablement

Fire up the ADSI Edit Tool

Active Directory monitoring

This will open the ADSI Tool and click on Connect to

monitoring tools

Connect to Default naming context

Right-click DomainDNS object with the name of your domain “Mine here is TechDirectArchive”

Click on Properties and then switch to the Security tab. Click on Advanced

This will open the “Advanced Security Settings for your domain “TechDirectArchive”. Navigate to the Auditing tab

Add User, Computer or Group etc

Add Principal “Everyone”

Click on Success “Success”. This applies to “This object and Descendant objects”.

Permissions: Select all checkboxes except the following not checked in the image below

The screenshot below is the result of the permissions assigned to everyone

Click on “ok” to close the security properties windows. To test, open the “Event Viewer”. See the Various methods to launch the Event Viewer.

Navigate to the Windows log, Security, and click on “Filter Current Log”.

Search the Security log for event ID 4725 (User Account Management task category)

This will display the number of disabled users in the Event log as performed

Also, see Viewing Scheduled Events on AW using the Command Line (CLI), and how to Query MBAM to display the BitLocker Recovery report.

FAQs

What is the process for identifying the culprit behind the deactivation of a user account in Active Directory?

Investigate the Security event logs on the domain controller by filtering for events related to user account modifications. Analyze the event entries to extract information such as the username and workstation details, providing insights into who disabled the user account and when the action occurred.

How can I track down the person who deactivated a user in Active Directory?

Utilize the Windows Event Viewer on the domain controller to review security logs. Filter for events associated with user account modifications, focusing on the event details to ascertain the identity of the person who disabled the user account and the system used to act.

Are there specific logs or events I should check to identify the culprit behind a user account disablement in Active Directory?

review the Security logs on the Domain Controller, and pay attention to Event ID 4725. This event provides comprehensive information, allowing you to determine the user who was disabled and the entity responsible for the action.

I hope you found this article useful on How to detect who disabled a user in Active Directory. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Event Viewer, eventlog, Microsoft Windows, Monitoring, Monitoring tool, Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: How to find disabled Active Directory User accounts
Next Post: How to check if homebrew is installed on macOS

Related Posts

  • Fix Boot Failed UEFI SCSI Device on HyperV
    How to Fix Boot Failed UEFI SCSI Device on HyperV Virtualization
  • Install and configure wds 1
    Install Windows Deployment Services on Windows Server 2022 Windows Server
  • Screenshot
    An error occurred while attempting to start the selected VM Virtualization
  • schedulepythontasksinWindows
    Task Scheduler shows task still running despite successful Windows
  • featured 2 2
    Clone a repository and install software from GitHub on Windows Windows Server
  • banner 3
    How to Set Network Adapter Priority on Windows 11 Network | Monitoring

More Related Articles

Fix Boot Failed UEFI SCSI Device on HyperV How to Fix Boot Failed UEFI SCSI Device on HyperV Virtualization
Install and configure wds 1 Install Windows Deployment Services on Windows Server 2022 Windows Server
Screenshot An error occurred while attempting to start the selected VM Virtualization
schedulepythontasksinWindows Task Scheduler shows task still running despite successful Windows
featured 2 2 Clone a repository and install software from GitHub on Windows Windows Server
banner 3 How to Set Network Adapter Priority on Windows 11 Network | Monitoring

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Burn ISO on MAC   Proxmox installation
    Create a bootable USB on Mac: Proxmox VE Setup Virtualization
  • Windows Admin Center Apply Update
    How to Apply and Enable Automatic Windows Admin Center Update Windows
  • Trellix MVISOSN
    How to install Trellix MVISON Endpoint Security | Vulnerability Scans and Assessment
  • banner 3
    How to Set Network Adapter Priority on Windows 11 Network | Monitoring
  • Set a Resource Delete Lock
    How to Add a Delete Lock on Azure Resources AWS/Azure/OpenShift
  • SU
    How to switch users in Linux Linux
  • adfs
    Guide on federating ADFS with Azure Active Directory AWS/Azure/OpenShift
  • Update proxmox package database
    Resolve the Update Package Database failure on Proxmox VE Virtualization

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,832 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.