Losing important user accounts in Active Directory can be a major setback, but finding out who deleted them is the real puzzle. It’s not just about recovering lost accounts; it’s about understanding the why and how behind every deletion to maintain security, accountability, and control.
- Open the Windows PowerShell with an Administrative account.
- Run the below cmdlet to get the user who deleted the Active Directory users.
Get-EventLog -LogName Security |
Where-Object {$_.EventID -eq 4726} |
Select-Object -Property EventID, MachineName, TimeGenerated, Source, Message
The above cmdlet retrieves the user deletion event log entry and provides a complete view of the event’s properties. In this output, you can find who deleted the user under Message»Subject
If you are looking for specific information like the time of deletion, who performed the deletion, and the deleted users, you can use the below cmdlet.
Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4726} |
Select-Object TimeCreated,
@{Name='DeletedUser'; Expression={($_.Properties[0].Value)}},
@{Name='DeletedBy'; Expression={($_.Properties[1].Value)}}
Instantly identify who deleted the user account in Active Directory using AdminDroid!
The deleted users report provides an audit trail of all user deletions in your organization. It includes details such as who deleted the user, when it occurred, audit status, event logged computer, and more.
Handy Tip: You can easily download the report in your preferred format, such as CSV, PDF, etc., for easy sharing and record-keeping using AdminDroid’s export feature.