Direct Inward Dialing: +1 408 916 9892
Keeping track of privileged users' activities is necessary to protect critical assets and fulfill compliance requirements. By identifying and monitoring privileged accounts, IT administrators can mitigate external cyberattacks as well as insider threats such as privilege misuse.
The following is a comparison between the procedures for identifying privileged accounts with Windows PowerShell and ADAudit Plus:
The following cmdlet returns a list of high-privileged accounts that are authenticated by RODC but not revealed in html format.
Get-ADDomainController -Filter {IsReadOnly -eq $True} | Get-ADRodcAuthenticatedNotRevealed | -ReportType HTML | Out-File -FilePath C:\PrivilegedAccountReports\Report1.html
(Mention the location where report needs to be saved)
Following are the limitations to obtain report of privileged users using native tools like Windows PowerShell:
ADAudit Plus will automatically scan all DCs in the domain to retrieve information about privileged users, generate the report and present it in a simple and intuitively designed UI.
Logon-Logoff
Account lockouts
Windows event logs
File server auditing
Active Directory auditing
Azure AD
Server auditing
Computer start-ups and shut-downs