I'm looking for a way to track total property changes within an AD user's account. As an example, per PCI and SSAE requirements, user accounts must not be permanent, they must be set to expire in 89 days or fewer.
I was able to run the report that showed me a dozen or so users that were set to "not expire" which is great. I'd like to know however whether this user was setup that way originally or if another sysadmin had changed this status for whatever reason.
This brought up other uses, like tracking if a sysadmin has reset a password rather than having the user use our self help password reset portal, and obviously there are many more options to consider.
Basically we're looking for a forensic type report that handles AD user account properties. Is there something already that does this? Or would it mean writing my own?
Ok, so I'll add this to my original post. I found a pretty basic and generic search which I then created a report based on the windows event ID.
eventtype="wineventlog_windows" sourcetype="*inEventLog:*" (host="*" OR ComputerName="*") TaskCategory="*" SourceName="*" EventCode="1102" Type="*"
I then just used this as a base, modified the EventCode to the ID I was tracking and voila, solid report for that function.
I found this very handy list of event codes and generated the ones I needed to see like user account lockouts, user deletions and creations, alert logs cleared (above code) and others that fit into my daily security checklist.
Yea, I posted a link but am too new, it stripped out the actual address. That one I found was very good also.
But in the end, I setup a great set of daily reports and I just plow through them first thing in the morning and make my notes based on the reports.