Active Directory Ac...
 
Notifications
Clear all

Active Directory Activity Analiysis

5 Posts
4 Users
0 Reactions
2,877 Views
nightworker
(@nightworker)
Estimable Member
Joined: 16 years ago
Posts: 134
Topic starter  

Dear coleagues

I have a case that insider fraud of corporate technical files.

I have an image of active directory server and suspect staff images

From active directory server which artifact can i found it?Is there any data data leakage evidence of log files or something like that?


   
Quote
Bunnysniper
(@bunnysniper)
Reputable Member
Joined: 13 years ago
Posts: 259
 

The only thing you can find there is the security log to see when the user logged in. That`s it. You need the device that was used by the suspect for your analysis.

regards,
Robin


   
ReplyQuote
nightworker
(@nightworker)
Estimable Member
Joined: 16 years ago
Posts: 134
Topic starter  

The only thing you can find there is the security log to see when the user logged in. That`s it. You need the device that was used by the suspect for your analysis.

regards,
Robin

Thanks for your reply robin. i we cannot track activities why companies use this useless active directory. We should speak microsoft.


   
ReplyQuote
Thomas
(@thomas)
Trusted Member
Joined: 19 years ago
Posts: 59
 

It also depends on how the auditing is set. On the other hand it depends on what you are looking for. For a complete picture you indeed need the logfiles of the local workstations if available….

https://blog.stealthbits.com/best-practices-for-auditing-active-directory


   
ReplyQuote
Northwind
(@northwind)
Eminent Member
Joined: 7 years ago
Posts: 33
 

Active Directory is a database. Includes information such as printer, user, client. File path% systemroot% NTDS


   
ReplyQuote
Share: