The story:
I have got a request from a client asking to find out which server(s) is using which domain admin or a highly privileged account as a service.
To find this I already wrote a powershell script that does this, Search the non standard/(Domain only users) and show the services and name of the servers where those accounts are configured on utilizing Remote powershell to do so and the use of a Domain Admin user.
You can refer to this link to see this article by clicking here
Creating the script process:
The same client wanted to also know which of those accounts did authenticate and wanted to know from which server/Computer did the request originate from and to which DC did it go.
I have started thinking of the process of doing so by again utilizing remote PowerShell to check against certain security events on AD to check which user among the Domain admin members did authenticate.
After sometime and with the help of some forums I managed to get script ready which looks in all Domain Controllers for users that are members of the Domain Admin groups who triggered an event ID 4624 and from which Computer did this request came from.
The Script :
# Get domain admin user list $DomainAdminList = Get-ADGroupMember -Identity 'Domain Admins' # Get all Domain Controller names $DomainControllers = Get-ADDomainController -Filter * | Sort-Object HostName # EventID $EventID = '4624' # # Get only last 24hrs $Date = (Get-Date).AddDays(-3) # Limit log event search for testing as this will take a LONG time on most domains # For normal running, this will have to be set to zero $MaxEvent = 100 # Loop through Dcs $DALogEvents = $DomainControllers | ForEach-Object { $CurDC = $_.HostName Write-Host "`nSearching $CurDC logs..." Get-WinEvent -ComputerName $CurDC -FilterHashtable @{Logname='Security';ID=$EventID;StartTime = $Date} -MaxEvents $MaxEvent |` Where-Object { $_.Properties[5].Value -in $DomainAdminList.SamAccountName } |` ForEach-Object { [pscustomobject]@{SourceIP = $_.Properties[18].Value; SamAccountName = $_.Properties[5].Value;Time = $_.TimeCreated;LogonEventLocation = $CurDC} } } $DALogEvents
How to run:
The Script must be run on DC with a privileged account in order to get the write results, The default time interval is set to 3 days but you can choose to increase that.
You can also change the default group where you want to search for members by changing Domain Admin groups to something else.