- Related Products
- ADManager Plus
- ADSelfService Plus
- EventLog Analyzer
- Exchange Reporter Plus
- AD360
- Log360
Cause:
Post installation, ADAudit Plus automatically discovers the local domain from the DNS server configured on the machine running ADAudit Plus. This error occurs when no domain details are found on the DNS server.
Solution:
Ensure that your domain is listed under Domain Settings in ADAudit Plus.
Cause:
Post installation, ADAudit Plus automatically discovers the domain controllers (DC) in the local domain. This error occurs when the domain controllers in the domain are unreachable.
Solution:
Check if the LDAP port (port no. 389) and RPC ports (static port no.135 and dynamic port no. 49152- 65535) are open to ensure that ADAudit Plus is able to contact the domain controllers in the domain.
Troubleshooting:
Ping all the DCs added in ADAudit Plus.
Cause:
While adding a domain, this error occurs when ADAudit Plus in unable to reach the domain.
Solution:
Ping the discovered domain controllers by name from the ADAudit Plus server and try to connect to the Syslog folder to ensure that domain controllers in the domain are accessible.
The "Last Event Read Time" in ADAudit Plus is the last time that ADAudit Plus has contacted the security log of the event viewer and fetched newly logged audit data. The Last Event Read Time changes only if there is fresh and relevant data complying to the audit policy available in the security logs of corresponding computers.
Domains that do not have trust with domains configured in ADAudit Plus are considered as remote domains and the servers in those domains are remote servers. You can audit remote servers by following the steps below:
For further queries, reach out to us via support@adauditplus.com.
Log in to any computer that has the Group Policy Management Console (GPMC), with Domain Admin credentials → Open GPMC → Right click on Group Policy Results → Group Policy Results Wizard → Select the computer, user (current user) → Verify if the desired settings are configured.
Log in to any computer with Domain Admin credentials → Open Run → Type eventvwr.msc → Right click on Event Viewer → Connect to the target computer → Verify if events corresponding to the audit policies configured are getting logged.
For example: Kerberos Authentication Service Success advanced audit policy configuration should result in event ID 4768 getting logged.