IBM Support

Recommendations for Active Directory log monitoring

How To


Summary

To monitor Active Directory (AD) for replication issues, LDAP problems, DNS and KCC related errors in addition to large-scale changes, you'll need to enable diagnostic logging, auditing policies, and relevant event logs on your domain controllers (DCs).

Objective

This setup uses native Windows tools like Registry Editor, Group Policy Management, and Event Viewer.

 

It's recommended to perform these steps in a test environment first, as increased logging can impact performance.

 

Reset logging levels to defaults after troubleshooting. 

Environment

Windows

Steps

Monitoring can be done manually via Event Viewer or automated with tools like System Center Operations Manager (SCOM), third-party SIEM (Security Information and Event Managementsolutions, or event forwarding to a central server.  Details below!

 

Below is a safe, enterprise‑grade guide on how to set up Active Directory log monitoring for:

  • AD Replication Events
  • LDAP Query / Bind Issues
  • DNS Issues
  • Large Volumes of AD Changes

 

This guide is tool‑agnostic and applies whether you monitor logs using:

  • Windows Event Viewer
  • SIEM (Splunk, QRadar, Sentinel, ArcSight, LogRhythm, Elastic)
  • Sysmon + Event Forwarding

 

Third‑party AD audit tools samples: Quest, Semperis, ManageEngine, Varonis

 

1. Enable the Proper Audit Policies

You must ensure key auditing categories are enabled on Domain Controllers.

Recommended Advanced Audit Policy Configuration

 

Use Computer Configuration → Windows Settings → Security Settings → Advanced Audit Policy Configuration.

 

Directory Service Access

  • Directory Service Access
  • Directory Service Changes

Account Logon

  • Kerberos Authentication Service
  • Kerberos Service Ticket Operations
  • Credential Validation

Account Management

  • User Account Management
  • Computer Account Management
  • Group Management
  • Security Group Management

Policy Change

  • Audit Policy Change
  • Authentication Policy Change

DS Replication

  • Audit Directory Service Replication

 

How to apply via PowerShell:

PowerShell

auditpol /set /category:"DS Access" /subcategory:"Directory Service Changes" /success:enable /failure:enable

 

auditpol /set /category:"Account Logon" /subcategory:"Credential Validation" /success:enable /failure:enable

 

auditpol /set /category:"DS Access" /subcategory:"Directory Service Replication" /success:enable /failure:enable

 

Enable AD Diagnostic Event Logging for Replication, LDAP, and Changes

AD diagnostic logging captures detailed events in the Directory Service event log. This is controlled via registry settings on each DC

 

Relevant categories include Replication Events (for AD replication), LDAP Interface Events (for LDAP issues), and Directory Access (for tracking AD object accesses and modifications, which can indicate large changes).

 

Steps:

  • Open Registry Editor as an administrator (run regedit).
  • Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics.
  • For each relevant category, double-click the entry and set the REG_DWORD value to a logging level (0-5, where 0 is none, 1 is minimal, and 5 is maximum verbosity—start with 2 or 3 to avoid overload):
    • 5 Replication Events: Set to 2-5 to log replication activities, such as synchronization failures or topology changes.
    • 16 LDAP Interface Events: Set to 2-5 to capture LDAP bind failures, query timeouts, or interface errors.
    • 8 Directory Access: Set to 2-5 to log accesses and modifications to AD objects, helping detect bulk changes.
  • Exit Registry Editor and restart the DC or the Netlogon service for changes to take effect.
  • Optionally, for advanced LDAP query monitoring (e.g., expensive or inefficient searches), set 15 Field Engineering to 5. These logs detailed query performance but should only be used temporarily.

 

 


 

2. Key Active Directory Event IDs to Monitor


A. AD REPLICATION ISSUES

 

Monitor on Domain Controllers (log: Directory Service)

Event ID

Meaning

1311

Topology issue – replication path unavailable

1566

No replication partner

1864

DC has not replicated in a long time

2042

USN rollback detected (critical)

1925

Replication failed due to DNS

2087/2088

DC cannot find DNS SRV records

 

Also monitor File Replication Service (FRS) or DFS Replication logs depending on your environment.


B. LDAP ISSUES

 

Monitor Directory Service and Security logs.

Event ID

Description

2886

LDAP signing not required (vulnerable)

2887

LDAP simple binds happening without SSL

2888

LDAP simple bind rejected

2889

Identifies client performing unsigned LDAP binds

4624 (Logon Type 8)

LDAP binds (successful)

4625

Failed LDAP bind

 163/1644                     LDAP query counts and details

 1317                            Timeouts

 1535                            Server errors

 4662                            Directory access/object access


C. DNS ISSUES (Active Directory–Integrated DNS)

 

Monitor on DNS servers (usually DCs).

Event Channel

Key Events

DNS Server

4000 – DNS server failure 
4013 – AD DS is not ready for DNS 
4015 – General DNS internal failure

Directory Service

2087/2088 – Cannot resolve DNS SRV records

Zone transfer failures 

6702

 

Also consider enabling DNS Debug Logging (use sparingly).


 

D. Monitor Large Volumes of AD Changes

 

Changes are logged under Security with Directory Service Changes enabled.

Event ID

Meaning

5136

Object modified

5137

Object created

5138

Object undeleted

5139

Object moved

5141

Object deleted

 

To detect bulk changes, set SIEM thresholds such as:

  • >20 group changes in 5 minutes
  • >50 password resets in 10 minutes
  • >1000 attribute modifications from a single admin

 

3. Forward Logs to a Central Location

 

Recommended approaches

 

Option A: Windows Event Forwarding (WEF)

  • Built into Windows
  • No agent needed
  • Recommended for small/medium AD forests

 

Option B: Forward to a SIEM

 

Most enterprises use:

  • Microsoft Sentinel (via Log Analytics Agent)
  • Splunk Universal Forwarder
  • IBM QRadar WinCollect
  • Elastic Agent
  • ArcSight SmartConnector

 

Forward at minimum:

  • Security
  • System
  • Application
  • Directory Service
  • DNS Server
  • DFS Replication (if used)

 

 

Additional Recommended Monitoring

 

Track “Privileged Group Changes”

  • Domain Admins
  • Enterprise Admins
  • Schema Admins
  • DNS Admins

 

Events:

  • 4728, 4729 — Global group member added/removed
  • 4732, 4733 — Local group member added/removed

 

Monitor for Rogue Domain Controllers

 

Event ID:

  • 4742 – Computer object changes (DC promotion often shows here)
  • 2886/2887 LDAP insecure binds from unknown machine

 

KCC-related errors you could monitor:

Event ID

Meaning

1308

KCC cannot connect to a replication partner (often DNS or RPC issue).

1311

KCC cannot build a spanning tree/topology — sites may not be able to replicate.

1312

KCC cannot establish connections due to missing or broken site links.

1566

KCC cannot find a server for the specified directory partition.

1865

KCC failed to build a replication path — commonly caused by DNS issues.

1925

Replication partner cannot be found — often due to topology or DNS SRV issues.

Document Location

Worldwide

[{"Type":"MASTER","Line of Business":{"code":"LOB66","label":"Technology Lifecycle Services"},"Business Unit":{"code":"BU070","label":"IBM Infrastructure"},"Product":{"code":"SSTIPK","label":"Microsoft Windows"},"ARM Category":[{"code":"a8mKe000000004NIAQ","label":"Windows"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":""}]

Document Information

Modified date:
27 February 2026

UID

ibm17262117