Domain User Login History
Starting from windows server 2008 and up to windows server 2016 the event id for a user logon event is 4624.
Domain user login history. 4 to link the new gpo to your domain right click. This gpo can be configured to audit all logons of a user when they sign in to the domain. Microsoft active directory stores user logon history data in the event logs on domain controllers.
The first step in tracking logon and logoff events is to enable auditing. How to view microsoft account login history on windows 10. Let s use an example to get a better understanding.
Starting from windows server 2008 and up to windows server 2016 the event id for a user logon event is 4624. These events contain data about the user time computer and type of user logon. Get all ad users logon history with their logged on computers with ips ous this script will list the ad users logon information with their logged on computers by inspecting the kerberos tgt request events eventid 4768 from domain controllers.
The session end time can be obtained using the event id 4647 is 11 24 2017 at 03 02 pm. These events contain data about the user time computer and type of user logon. Select link an existing gpo and choose the.
In the event properties given above a user with the account name testuser1 had logged in on 11 24 2017 at 2 41 pm. User logon event properties. You can tell windows the specific set of changes you want to monitor so that only these events are recorded in the security log.
Real time web based active directory change auditing and reporting solution by manageengine adaudit plus. A domain user s logon history can be viewed by configuring a gpo. This way all users domain logons can be pulled up easily.