LDAP/Active Directory - How to retrieve User login history, success and failures, VPN logins / On-Site Domain Controller logins etc.

Srini 1 Reputation point
2021-01-11T23:00:29.787+00:00

LDAP / Active Directory -

How can I retrieve User login history, login successes, and login failures, VPN logins / On-Site Domain Controller logins events etc. periodically using remote federated mechanisms ?

Any pointers are appreciated.

Microsoft Security Microsoft Entra Other
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Marilee Turscak-MSFT 37,206 Reputation points Microsoft Employee Moderator
    2021-01-12T00:07:52.9+00:00

    You can enable audit logs on the domain controller and check for that type of information. The audit logs include AccountLogon and LogonLogoff and show the user attempts to access a particular computer.

    The security audit logs should show you these types of events. There's nothing LDAP specific there but they should give you what you're looking for. https://learn.microsoft.com/en-us/azure/active-directory-domain-services/security-audit-events

    If you don't see these there may be an issue with your LDAP connection and I would suggest opening a support ticket.

    https://learn.microsoft.com/en-us/azure/active-directory-domain-services/security-audit-events

    1 person found this answer helpful.

  2. Srini 1 Reputation point
    2021-01-12T02:24:09.437+00:00

    Thanks Marilee. This is super helpful. Is there anyway these commands as specified can be invoked from an external federated endpoint using a REST API interfaces. such as HTTP GET/POST etc..

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.