ADAudit Plus simplifies the process of tracking PowerShell activity by transforming the raw and noisy PowerShell log data into real-time reports and alerts. This enables you to stay on top of PowerShell activity with ease.
Audit PowerShell commands and the contents of scripts that are executed in your Windows Server environment.
Know who executed a PowerShell process, when, and from where in your environment.
Automate the generation and delivery of PowerShell auditing reports to meet compliance needs.
Get notified in real time via email and SMS about critical activities, such as the execution of a particular script.
Windows PowerShell is widely used to manage critical Windows Server resources, such as users, groups, GPOs, and files. So, tracking PowerShell activity is imperative. PowerShell activity occurring in your environment can be tracked by following the three steps outlined below.
PowerShell supports three types of logging: module logging, script block logging, and transcription.
Tip: It is recommended that, at a minimum, script block logging should be enabled to track code executed in PowerShell.
To configure PowerShell log size via Group Policy, navigate to Computer Configuration → Preferences → Windows Settings. Right-click Registry, then select New → Registry Item. In the New Registry Properties window:
Tip: The size of the PowerShell event log should be set to at least 150MB to ensure that data is preserved for a reasonable period of time.
PowerShell logs can be found in the Event Viewer under
Application and Service Logs → Microsoft → Windows → PowerShell → Operational.
Tip: Considering the huge volume of PowerShell events that get generated, keeping track of PowerShell activity using native tools can be a labor-intensive process. A third-party solution like ADAudit Plus can help you overcome this problem.
Receive real-time notifications on changes occurring across both on-premises and Azure Active Directory.
Gain complete visibility into user logon activity, spanning from logon failures to logon history.
Detect lockouts instantly and know their root cause by tracking down the source of authentication failures.
Get a consolidated audit trail of administrator and other privileged user activities.
Audit access to Windows, NetApp, EMC, and Synology files and folders.
Monitor local logon/logoff activities; changes to local users, groups, user rights; and more.
Leverage user behavior analytics (UBA) to detect anomalies based on activity patterns.
Automate generation of detailed reports and demonstrate compliance with SOX, GDPR, and other mandates.