Magic Quadrant™ for Privileged Access Management 2025: Netwrix Recognized for the Fourth Year in a Row. Download the report.

Platform
Resource centerHow-to-Guide
How to Detect Who Modified Permissions to an Organizational Unit

How to Detect Who Modified Permissions to an Organizational Unit

Native Auditing

  1. Run gpedit.msc → Create a new GPO → Edit it: Go to "Computer Configuration" → Policies → Windows Settings → Security Settings → Local Policies → Audit Policy:
    • Audit directory service access → Define → Success and Failures.
  2. Go to Event Log → Define:
    • Maximum security log size to 4gb
    • Retention method for security log to "Overwrite events as needed".
  3. Link the new GPO to OU: Go to "Group Policy Management" → Right-click the defined OU → Choose "Link an Existing GPO" → Choose the GPO that you’ve created.
  4. Force the group policy update: In "Group Policy Management" right-click the defined OU → Click "Group Policy Update".
  5. Open ADSI Edit → Connect to Default naming context → Right-click domainDNS object with your domain name → Properties → Security → Advanced → Auditing → Add Principal "Everyone" → Type "Success" → Applies to "This object and descendant objects" → Permissions → Select all checkboxes except the following and сlick "OK":
    • Full Control
    • List Contents
    • Read all properties
    • Read permissions.
  6. Open Event Viewer → Search security log for event ID 5136 (a directory service object was modified).
    After that you will be able to see who has modified permissions to what OU with a list of security descriptors.
Image

Netwrix Auditor for Active Directory

  1. Run Netwrix Auditor → Click "Reports" → Navigate to Active Directory → Active Directory Changes → Choose "Organizational Unit Changes" → Click "View".
  2. In order to save a report, click "Export button" → PDF → Save as → Choose a location to save it.
Image

Share on