Skip to content
  • Blog
  • About
Search for:

Knowledge Base

Some notes from work

  • My linkedin profile

4688Tag ArchiveSubscribe

AD DS: Collect User cmd history

  • Posted on: 30 March, 2021 30 March, 2021
  • Author: niklas
  • Tags: 4688, ADDS, Audit, event, forensic, Microsoft, Powershell, Windows, Windows Server
  • Comment(s): AD DS: Collect User cmd history

After enabling auditing for event 4688, see post about auditing Microsoft AD DS(TBD). You can collect logs to see cmd activity for a user. I have wrote this powershell function little quick to help me out with this. But I do recommend an greylog for this purpose.

Search

Search for:

Recent Posts

  • Powershell: Update computer group membership
  • Powershell: Get free diskspace remote computer
  • Microsoft SQL: Get freespace in database file
  • Add DNS alias for Domain Controller
  • AD DS: Collect User cmd history

Tags

4688 active directory ADCS ADDS alias apache Audit CMI_DATETIME convert datetime DHCP DNS domain controller event extract forensic format Hostname https joomla kerberos logon mariadb Microsoft mysql php Powershell privileges remi rhel rhel7 RHEL8 rpm scope SELinux sql ssh ssl troubleshooting virtual host Windows Windows Server WMI yum yum-cron

©  2025  Knowledge Base .  Proudly powered by WordPress. Canary ,   Theme by Linesh Jose .