Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » How to detect who disabled a user in Active Directory
  • cockpit
    Installation and configuration of Cockpit on CentOS Linux Linux
  • Header image
    How to setup a Third-Party DNS Server on a Linux Server Linux
  • image 63
    What to do when your Remote Desktop Licensing Manager Server Crashes Windows
  • any
    Install AnyDesk on Windows for remote Connections Windows
  • Container insights
    How to use Container Insights for Azure Kubernetes Workload Network | Monitoring
  • maxresdefault
    How to fix Error reading setup initialization file Windows
  • TamperProtection
    Protect Microsoft Defender Settings with Tamper Protection Security | Vulnerability Scans and Assessment
  • MBAM Reports
    Microsoft BitLocker Administration and Monitoring Report Fields Windows Server

How to detect who disabled a user in Active Directory

Posted on 19/03/202008/09/2024 Christian By Christian No Comments on How to detect who disabled a user in Active Directory
detect user disablement

This method is a pretty straightforward approach when using a third-party Software to monitor the Active Directory. These tools help in mitigating challenges when it comes to managing and monitoring AD. In this article, we shall discuss how to detect who disabled a user in Active Directory. Please see how to detect if an application was uninstalled on Windows: Find out who has uninstalled an application via Windows Event Viewer, and how to find out who restarted Windows Server.

Some monitoring tools and software are as follows.

  • Data Protection Manager from Microsoft
  • Microsoft System Center Management Pack for ADDS
  • Spiceworks
  • Netwrix
  • SolarWinds Server and Application Manager
  • ManageEngine ADManager Plus
  • ManageEngine ADAudit Plus
  • Lepide Active Directory Auditor
  • Netwrix Auditor for AD
  • Quest Active Administrator
  • Varonis
  • FirstWare AD-Inspector
  • Quest Active Administrator
  • PRTG Active Directory Monitor

Many others are capable of monitoring the Active Directory environment (detect who disabled a user in Active Directory).

Determine who has disabled a user

To determine who has disabled a user using built-in Active Directory tools, follow the steps below. Launch the Group Policy Management tool

Active Directory monitoring

Create a new GPO

monitoring tools

Name the GPO whatever you desire as shown below

detect user disablement

Now edit the newly created GPO as shown below

Active Directory monitoring

Enable the Audit Policy

This will be open the “Group Policy Management Editor”
– Go to “Computer Configuration”
– Click on Policies
– Windows Settings
– Security Settings
– Local Policies and
– Audit Policy: Here on the “Audit account management”
– Define these policy settings to “Success”

monitoring tools

The result will be as shown below

software detection

Define the log Size

Next, navigate to Event Log and define the policy settings as shown below. Maximum security log size to 4194304 KB

detect user disablement

Retention method for security log to Overwrite events as needed.

monitoring tools

Next, link the new GPO to the OU with User Accounts that you want to audit
– Go to “Group Policy Management”
– Right-click the defined OU
– Choose “Link an Existing GPO”

Active Directory monitoring

Choose the GPO that you’ve created.

monitoring tools

In this way, the GPO will be linked to the OU as shown below

monitoring tools

Next, update the group policy on the Employee OU. Here are the steps to do this below

software detection

On the Group Policy Management prompt as shown below. Click on OK

detect user disablement

Fire up the ADSI Edit Tool

Active Directory monitoring

This will open the ADSI Tool and click on Connect to

monitoring tools

Connect to Default naming context

Right-click DomainDNS object with the name of your domain “Mine here is TechDirectArchive”

Click on Properties and then switch to the Security tab. Click on Advanced

This will open the “Advanced Security Settings for your domain “TechDirectArchive”. Navigate to the Auditing tab

Add User, Computer or Group etc

Add Principal “Everyone”

Click on Success “Success”. This applies to “This object and Descendant objects”.

Permissions: Select all checkboxes except the following not checked in the image below

The screenshot below is the result of the permissions assigned to everyone

Click on “ok” to close the security properties windows. To test, open the “Event Viewer”. See the Various methods to launch the Event Viewer.

Navigate to the Windows log, Security, and click on “Filter Current Log”.

Search the Security log for event ID 4725 (User Account Management task category)

This will display the number of disabled users in the Event log as performed

Also, see Viewing Scheduled Events on AW using the Command Line (CLI), and how to Query MBAM to display the BitLocker Recovery report.

FAQs

What is the process for identifying the culprit behind the deactivation of a user account in Active Directory?

Investigate the Security event logs on the domain controller by filtering for events related to user account modifications. Analyze the event entries to extract information such as the username and workstation details, providing insights into who disabled the user account and when the action occurred.

How can I track down the person who deactivated a user in Active Directory?

Utilize the Windows Event Viewer on the domain controller to review security logs. Filter for events associated with user account modifications, focusing on the event details to ascertain the identity of the person who disabled the user account and the system used to act.

Are there specific logs or events I should check to identify the culprit behind a user account disablement in Active Directory?

review the Security logs on the Domain Controller, and pay attention to Event ID 4725. This event provides comprehensive information, allowing you to determine the user who was disabled and the entity responsible for the action.

I hope you found this article useful on How to detect who disabled a user in Active Directory. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Event Viewer, eventlog, Microsoft Windows, Monitoring, Monitoring tool, Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: How to find disabled Active Directory User accounts
Next Post: How to check if homebrew is installed on macOS

Related Posts

  • Windows 10 Upgrade 1 1
    Perform an in-place upgrade from Windows Server 2016 to Windows Server 2019 Windows Server
  • Windows Deployment Services
    How to migrate WDS and MDT to a new Windows Server Windows Server
  • Windows Server vNext
    What’s New? Install Windows Server 2025 on Beelink EQ12 PC Windows
  • Capture 91
    How to install IIS Web Server on Windows Server Web Server
  • ddf 2
    Add boot and install images to WDS and configure Multicast transmission via the GUI and WDSUTIL Windows Server
  • How does key rotation work in MBAM
    How does Key Rotation work in MBAM? Oracle/MSSQL/MySQL

More Related Articles

Windows 10 Upgrade 1 1 Perform an in-place upgrade from Windows Server 2016 to Windows Server 2019 Windows Server
Windows Deployment Services How to migrate WDS and MDT to a new Windows Server Windows Server
Windows Server vNext What’s New? Install Windows Server 2025 on Beelink EQ12 PC Windows
Capture 91 How to install IIS Web Server on Windows Server Web Server
ddf 2 Add boot and install images to WDS and configure Multicast transmission via the GUI and WDSUTIL Windows Server
How does key rotation work in MBAM How does Key Rotation work in MBAM? Oracle/MSSQL/MySQL

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • cockpit
    Installation and configuration of Cockpit on CentOS Linux Linux
  • Header image
    How to setup a Third-Party DNS Server on a Linux Server Linux
  • image 63
    What to do when your Remote Desktop Licensing Manager Server Crashes Windows
  • any
    Install AnyDesk on Windows for remote Connections Windows
  • Container insights
    How to use Container Insights for Azure Kubernetes Workload Network | Monitoring
  • maxresdefault
    How to fix Error reading setup initialization file Windows
  • TamperProtection
    Protect Microsoft Defender Settings with Tamper Protection Security | Vulnerability Scans and Assessment
  • MBAM Reports
    Microsoft BitLocker Administration and Monitoring Report Fields Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.