Tracking “Admin” Logon Failures Down to the IP Address
Privileged access attacks are at an all-time high. In many cases, the attacks are not successful on the first attempt. The attacker tries to logon with one or more credentials, often many times for each account with failure before success. So, when it comes to tracking failed “admin” logon attempts, you could find and deny an attack before the attack is successful!
Trying to track down failed attempts for many user accounts can be a tedious task. Even if you know the names of the user accounts that have admin privileges, trying to search through the logs of each domain controller can be taxing, if not nearly impossible. Consider the following issues if you want to try and manually track failed logons by admin accounts using the security logs on each domain controller:
Figure 1. Logon failure report including IP address.
- Each DC contains a unique security log, which is not replicated
- Most security logs are set to “overwrite events as needed,” which can delete an event before it can be found
- The security log has a limit on size, so depending on the size of each log, the failed logon could be overwritten
- You can archive security logs, but in order to search them, you will need to manually insert them into Event Viewer or some other tool
- Alerts can be set up for failed logons; however, Microsoft's alerting does not get granular enough for you to specify only the accounts with admin credentials
- PowerShell can be used to search the security logs for specific events and details, but only if the log has not been archived

Detect privilege access attacks by tracking all logon failures with ADAudit Plus. Learn how, | Download free trial.
If you have a need to track all admin privileged accounts, you could create a custom report quickly and even associate an alert to any user on the custom report that fails to logon.
Comments