Check User Login History in Windows Active Directory (2024)

IT administrators often need to know who logged on to their computers and when for security and compliance reasons. Although you can use the native auditing methods supplied through Windows to track user account logon and logoff events, you may end up having to sift through thousands of records to reach the required log. Once you’ve found the required log, getting the required information for compliance and security reports is not an easy process.

Below are the steps to check Active Directory user login history using logon Event IDs.

  • Step 1- Enable Auditing for User Logon/Logoff Events
  • Step 2- Search Relevant Event IDs such as 4624, 4648 etc. in Event Viewer

Step 1- Enable Auditing for User Logon/Logoff Events

You can do this through two GPO settings:

1. Audit Logon Events: This setting generates events for starting and ending logon sessions. These events happen on the machine where you log in.

2. Audit Account Logon Events: This setting generates events on the computer that validates logons. When a domain controller authenticates a domain user account, events are generated and stored on that domain controller.

Below are the steps to enable auditing of user Logon/Logoff events:

  1. Open the “Group Policy Management” console by running the “gpmc.msc” command.
  2. If you want to configure auditing for the entire domain, right-click on the domain and click “Create a GPO in this domain, and Link it here…”.
  3. Create a new GPO dialog box that appears on the screen. Enter a new GPO name.
  4. Go to the new GPO, right-click on it, and select “Edit” from the context menu.
  5. “Group Policy Management Editor” window appears on the screen.
  6. In the navigation pane, go to “Computer Configuration” ➔ “Policies” ➔ “Windows Settings” ➔ “Security Settings” ➔ “Local Policies” ➔ “Audit Policy”.
    Check User Login History in Windows Active Directory (1)
  7. In the right pane, double-click the “Audit logon events” policy to open its properties window.
  8. Select the “Success” and “Failure” checkboxes, and click “OK”.
  9. Similarly, you have to enable “Success” and “Failure” for “Audit Account Logon Events”.
  10. Close “Group Policy Management Editor”.
  11. Now, you have to configure this new Group Policy Object (containing this audit policy) on all Active Directory objects including all users and groups. Perform the following steps.
    • In In “Group Policy Management Console”, select the new GPO (containing the above change).
    • In the “Security Filtering” section in the right panel, click “Add” to access the “Select User, Computer or Group” dialog box.
    • Type “Everyone”. Click “Check Names” to validate this entry. Click “OK” to add it and apply it to all objects.
    Check User Login History in Windows Active Directory (2)
  12. Close “Group Policy Management Console”.
  13. Now, run the following command to update GPO.
  14. gpupdate /force

Step 2- Search Relevant Logon Event IDs in Windows Event Viewer

After you have configured log on auditing, whenever users logon into network systems, the event logs will be generated and stored. To find out the details, you have to use Windows Event Viewer. Follow the below steps to view logon audit events:

  1. Go to Start ➔ Type “Event Viewer” and click enter to open the “Event Viewer” window.
  2. In the left navigation pane of “Event Viewer”, open “Security” logs in “Windows Logs”.
  3. You will have to look for the following event IDs for the purposes mentioned herein below.
    Event IDDescription
    4624A successful account logon event
    4625An account failed to log on
    4648A logon was attempted using explicit credentials
    4634An account was logged off
    4647User initiated logoff

For user logon, you have to search for 4624 and 4648 logon event IDs. For failed logon, you have to search for 4625. For logoff events, you have to search for 4634 and 4647.

In this article, we are searching for logon event IDs 4624 and 4648. The following screenshot shows Windows Event ID 4648 for the user logon attempted using explicit credentials.

Check User Login History in Windows Active Directory (3)

The following screenshot of Windows Event ID 4624 shows the session start time is displayed as Logged. In the Event Properties given below, a user, Shane, had logged in on 6/29/2023 at 12:11:30 PM.

Check User Login History in Windows Active Directory (4)

Use Lepide Active Directory Auditor to Check User Login History

Using Lepide Active Directory Auditor, you can easily monitor AD users’ login history by tracking their logon and logoff activities in real-time. The solution collects log on information from all added domain controllers automatically. Its report contains details on logon or logoff events, including when users logged in, from which computer, and when. You get accurate and instant reports on the login details of users in the network. The following screenshot shows a successful user logon report event captured by Lepide Active Directory Auditor:

Check User Login History in Windows Active Directory (5)

Lepide Auditor provides following reports related to logon/logoff:

Report NameDescription
Successful User Logon/LogoffIt shows all direct logon and logoff attempts performed on all computers in a domain.
Failed LogonIt shows all failed logon attempts done within the domain.
Domain Controller Logon/LogoffIt shows all logon/logoff activities done by the users on the domain controllers
User Logged on Multiple ComputersIt shows the list of users logged on more than one computer
Concurrent LogonsIt shows the successful logons made by a user concurrently on to the different
computers.

Conclusion

In this article, the steps to audit the user logon and logoff events through native auditing are explained. However, much noise is generated for the logon or logoff events that make it complicated for the IT administrators to have a real-time view. The easiest and more efficient way to audit the same with Lepide’sActive Directory Auditing solution has also been explained.

Check User Login History in Windows Active Directory (2024)
Top Articles
is it possible to see the private key of a certificate ? ( i mean a computer's private key )
How to Video Chat With Tango on Your Android or iOS Device
St Thomas Usvi Craigslist
Truist Bank Near Here
Po Box 7250 Sioux Falls Sd
Http://N14.Ultipro.com
Z-Track Injection | Definition and Patient Education
Ventura Craigs List
CA Kapil 🇦🇪 Talreja Dubai on LinkedIn: #businessethics #audit #pwc #evergrande #talrejaandtalreja #businesssetup…
J Prince Steps Over Takeoff
Autozone Locations Near Me
Derpixon Kemono
Globe Position Fault Litter Robot
Craigslist Labor Gigs Albuquerque
Lesson 2 Homework 4.1
Cvs Learnet Modules
Eka Vore Portal
Shannon Dacombe
Q33 Bus Schedule Pdf
Blackwolf Run Pro Shop
Dirt Removal in Burnet, TX ~ Instant Upfront Pricing
Rqi.1Stop
Self-Service ATMs: Accessibility, Limits, & Features
Panolian Batesville Ms Obituaries 2022
Form F-1 - Registration statement for certain foreign private issuers
Conscious Cloud Dispensary Photos
MyCase Pricing | Start Your 10-Day Free Trial Today
Jayah And Kimora Phone Number
Bill Remini Obituary
Best Boston Pizza Places
Tokyo Spa Memphis Reviews
Inter Miami Vs Fc Dallas Total Sportek
Blackboard Login Pjc
Malluvilla In Malayalam Movies Download
By.association.only - Watsonville - Book Online - Prices, Reviews, Photos
Jamielizzz Leaked
Ordensfrau: Der Tod ist die Geburt in ein Leben bei Gott
Federal Express Drop Off Center Near Me
Obsidian Guard's Skullsplitter
Bfri Forum
What does wym mean?
Dubois County Barter Page
Utexas Baseball Schedule 2023
Citibank Branch Locations In Orlando Florida
Gamestop Store Manager Pay
White County
Paradise leaked: An analysis of offshore data leaks
Clock Batteries Perhaps Crossword Clue
Mail2World Sign Up
Barber Gym Quantico Hours
Twizzlers Strawberry - 6 x 70 gram | bol
Ranking 134 college football teams after Week 1, from Georgia to Temple
Latest Posts
Article information

Author: Neely Ledner

Last Updated:

Views: 6359

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Neely Ledner

Birthday: 1998-06-09

Address: 443 Barrows Terrace, New Jodyberg, CO 57462-5329

Phone: +2433516856029

Job: Central Legal Facilitator

Hobby: Backpacking, Jogging, Magic, Driving, Macrame, Embroidery, Foraging

Introduction: My name is Neely Ledner, I am a bright, determined, beautiful, adventurous, adventurous, spotless, calm person who loves writing and wants to share my knowledge and understanding with you.