Hi @GlenTech ,
When we're looking in the Security Event Log of a Domain Controller, we will see the following types of events:
- activities performed by Domain Objects (Users, Computers, etc)
- activities performed by local users on the current Domain Controller
Now, this means, that if you want to audit the Logon (4624) and Logoff (4634) activities of your Domain Users, then is sufficient if you look in the Security Event Logs of all your Domain Controllers.
If you want to audit the Logon and Logoff also for Local Users (non-domain), then you will have to look in the Security Event Logs of all your servers / clients you want to audit (as the local users related events are generated locally).
Usually, organizations are using SIEM tools (Security Information and Event Management) to collect the required Security Events in a central data store, on top of which they can then query the entire set of events.
If you are interested in this, you can then have a look maybe at Microsoft Sentinel (Cloud based SIEM from Microsoft) that will allow you to collect the Security Events from your Domain Controllers (via agents), perform security detections, data visualizations, etc. and store them for a longer time.
I hope the above helps!
If so, please "Accept the answer", so we help the entire community here.
Thank you!
BR,
George