Direct Inward Dialing: +1 408 916 9892
In Active Directory, every event has an ID. Using the PowerShell Get-WinEvent cmdlet we can find auditing records. Alternatively, you can use a comprehensive AD auditing solution like ADAudit Plus that will make things simpler for you.
This article compares the method of getting AD audit reports using PowerShell and ADAudit Plus.
Get-WinEvent -Computer dc1 -FilterHashtable @{LogName="Security";ID=4720} | fl
Get-WinEvent -Computer dc1 -FilterHashtable @{LogName="Security";ID=4720} | Select TimeCreated,@{n="WHO";e={([xml]$_.ToXml()).Event.EventData.Data | ? {$_.Name -eq "SubjectUserName"} |%{$_.'#text'}}},@{n="User Account";e={([xml]$_.ToXml()).Event.EventData.Data | ? {$_.Name -eq "SamAccountName"}| %{$_.'#text'}}} |fl
Security logs comprise multiple events like, file or AD object modifications, account logon or logoff failures, permission changes.
screenshots:
Why ADAudit Plus is the better solution for you?
Logon-Logoff
Account lockouts
Windows event logs
File server auditing
Active Directory auditing
Azure AD
Server auditing
Computer start-ups and shut-downs