Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » How to detect who disabled a user in Active Directory

How to detect who disabled a user in Active Directory

Posted on 19/03/202008/09/2024 Christian By Christian No Comments on How to detect who disabled a user in Active Directory
detect user disablement

This method is a pretty straightforward approach when using a third-party Software to monitor the Active Directory. These tools help in mitigating challenges when it comes to managing and monitoring AD. In this article, we shall discuss how to detect who disabled a user in Active Directory. Please see how to detect if an application was uninstalled on Windows: Find out who has uninstalled an application via Windows Event Viewer, and how to find out who restarted Windows Server.

Some monitoring tools and software are as follows.

  • Data Protection Manager from Microsoft
  • Microsoft System Center Management Pack for ADDS
  • Spiceworks
  • Netwrix
  • SolarWinds Server and Application Manager
  • ManageEngine ADManager Plus
  • ManageEngine ADAudit Plus
  • Lepide Active Directory Auditor
  • Netwrix Auditor for AD
  • Quest Active Administrator
  • Varonis
  • FirstWare AD-Inspector
  • Quest Active Administrator
  • PRTG Active Directory Monitor

Many others are capable of monitoring the Active Directory environment (detect who disabled a user in Active Directory).

Determine who has disabled a user

To determine who has disabled a user using built-in Active Directory tools, follow the steps below. Launch the Group Policy Management tool

Active Directory monitoring

Create a new GPO

monitoring tools

Name the GPO whatever you desire as shown below

detect user disablement

Now edit the newly created GPO as shown below

Active Directory monitoring

Enable the Audit Policy

This will be open the “Group Policy Management Editor”
– Go to “Computer Configuration”
– Click on Policies
– Windows Settings
– Security Settings
– Local Policies and
– Audit Policy: Here on the “Audit account management”
– Define these policy settings to “Success”

monitoring tools

The result will be as shown below

software detection

Define the log Size

Next, navigate to Event Log and define the policy settings as shown below. Maximum security log size to 4194304 KB

detect user disablement

Retention method for security log to Overwrite events as needed.

monitoring tools

Next, link the new GPO to the OU with User Accounts that you want to audit
– Go to “Group Policy Management”
– Right-click the defined OU
– Choose “Link an Existing GPO”

Active Directory monitoring

Choose the GPO that you’ve created.

monitoring tools

In this way, the GPO will be linked to the OU as shown below

monitoring tools

Next, update the group policy on the Employee OU. Here are the steps to do this below

software detection

On the Group Policy Management prompt as shown below. Click on OK

detect user disablement

Fire up the ADSI Edit Tool

Active Directory monitoring

This will open the ADSI Tool and click on Connect to

monitoring tools

Connect to Default naming context

Right-click DomainDNS object with the name of your domain “Mine here is TechDirectArchive”

Click on Properties and then switch to the Security tab. Click on Advanced

This will open the “Advanced Security Settings for your domain “TechDirectArchive”. Navigate to the Auditing tab

Add User, Computer or Group etc

Add Principal “Everyone”

Click on Success “Success”. This applies to “This object and Descendant objects”.

Permissions: Select all checkboxes except the following not checked in the image below

The screenshot below is the result of the permissions assigned to everyone

Click on “ok” to close the security properties windows. To test, open the “Event Viewer”. See the Various methods to launch the Event Viewer.

Navigate to the Windows log, Security, and click on “Filter Current Log”.

Search the Security log for event ID 4725 (User Account Management task category)

This will display the number of disabled users in the Event log as performed

Also, see Viewing Scheduled Events on AW using the Command Line (CLI), and how to Query MBAM to display the BitLocker Recovery report.

FAQs

What is the process for identifying the culprit behind the deactivation of a user account in Active Directory?

Investigate the Security event logs on the domain controller by filtering for events related to user account modifications. Analyze the event entries to extract information such as the username and workstation details, providing insights into who disabled the user account and when the action occurred.

How can I track down the person who deactivated a user in Active Directory?

Utilize the Windows Event Viewer on the domain controller to review security logs. Filter for events associated with user account modifications, focusing on the event details to ascertain the identity of the person who disabled the user account and the system used to act.

Are there specific logs or events I should check to identify the culprit behind a user account disablement in Active Directory?

review the Security logs on the Domain Controller, and pay attention to Event ID 4725. This event provides comprehensive information, allowing you to determine the user who was disabled and the entity responsible for the action.

I hope you found this article useful on How to detect who disabled a user in Active Directory. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Event Viewer, eventlog, Microsoft Windows, Monitoring, Monitoring tool, Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: How to find disabled Active Directory User accounts
Next Post: How to check if homebrew is installed on macOS

Related Posts

  • fgh
    Configure log on as a batch job permissions on any server Windows Server
  • banner 3
    How to Enable or Disable SuperFetch in Windows 11 Windows
  • diagnose
    How to Diagnose a Windows Hardware Issue Windows
  • group
    How to update PowerShell and Package Management via Group Policy Object Windows Server
  • windows server 1
    In-place upgrade for Windows Server 2012 to Windows Server 2019 Windows Server
  • jmeterlogo 3
    Install and conduct performance testing using Apache JMeter on your Web App Configuration Management Tool

More Related Articles

fgh Configure log on as a batch job permissions on any server Windows Server
banner 3 How to Enable or Disable SuperFetch in Windows 11 Windows
diagnose How to Diagnose a Windows Hardware Issue Windows
group How to update PowerShell and Package Management via Group Policy Object Windows Server
windows server 1 In-place upgrade for Windows Server 2012 to Windows Server 2019 Windows Server
jmeterlogo 3 Install and conduct performance testing using Apache JMeter on your Web App Configuration Management Tool

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Screenshot 2020 06 23 at 10.52.52
    How to uninstall Microsoft SQL Server on Windows Oracle/MSSQL/MySQL
  • azure logo
    Azure CLI commands: How to use Azure Command-line Interface AWS/Azure/OpenShift
  • msinfo32 thumbnail
    How to use MSINFO32 to view System Information Windows
  • powershell01 3
    How to install and Update Azure PowerShell on your Windows PC AWS/Azure/OpenShift
  • How to Change the Default Web Browser on Windows 11 banner
    How to Change the Default Web Browser on Windows 11 Windows
  • Featured image Teams Whiteboard
    How to use Whiteboard in Microsoft Teams meetings Windows
  • screenshot 2020 04 26 at 19.14.07
    Windows 2016 Servers do not show up on the WSUS console Windows Server
  • MicrosoftOneDrive32
    Microsoft OneDrive Setup: Files On-Demand & Key Features Backup

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

Loading Comments...

You must be logged in to post a comment.