Skip to content

How to monitor administrative privileges use

Monitoring administrative privileges requires configuring audit coverage, building views, and scheduling reports.

1. Ensure audit data is collected

Collect operating system and application logs that record privileged actions:

  • Windows: security, system, and Active Directory audit logs (for example, account management, logon/logoff, policy changes)
  • Linux: system logs for user/group creation, privilege elevation, and sudo activity

Relevant collection guides include:

2. Define which privileged actions are relevant

Focus on high-risk actions:

  • Windows: user creation, event log cleared, password resets, user account management
  • Linux: group creation, user creation, user/group deletion

Example audit dashboards

Additional guidance for self‑audit of CYBERQUEST users is available in: How to monitor CYBERQUEST user activities.

3. Use reports to review activity

Run reports interactively for investigations or schedule them for regular delivery (for example, daily or weekly summaries of administrative changes).

Privilege use reports

For details on creating and running reports, see: How to create a new report and run it.