How-to Guides

Our step-by-step guides explain how to find information about configuration settings, changes and access events.
All Guides
Active Directory
Microsoft Entra ID
File Servers
Windows Server
Exchange
SharePoint
SQL Server
Oracle Database
VMware
MS Teams
Most Popular
SharePoint
How to Get a SharePoint Online Permissions Report

SharePoint Online permissions are scattered across multiple menus and settings. Learn how to get a simple report on who can access what in your SharePoint Online environment.

File Servers
How to Locate Files Containing Sensitive Data

Learn how to locate files on your file servers that contain sensitive data so you can ensure compliance and strengthen your security posture.

SQL Server
How to Audit SQL Server Logins

Learn how to enable SQL server login auditing using either native SQL Server capabilities or Netwrix Auditor.

SharePoint
How to Check SharePoint Permissions

Learn how to easily check SharePoint permissions for any account so you can ensure that each user has the proper permissions for their job.

Active Directory
How to Find Last Password Change Date

While troubleshooting an account lockout or investigating an attack, you need to find out when a user last changed their password. Learn how to find the last password change date.

File Servers
How to Find Empty Folders

Having a lot of empty folders on your file shares makes navigation harder for users and complicates provisioning and auditing processes. Learn how to find empty folders so you can clean up your file shares.

Active Directory
How to List AD Group Members

Learn how you can get a list of AD group members in couple of clicks so you can streamline attestation of privileged groups to ensure that only authorized users have administrative rights.

SharePoint
How to Get a SharePoint Permissions Report

Learn how to get a SharePoint permissions report in a few simple steps so you can ensure permissions are aligned with employees’ responsibilities.

SQL Server
How to Detect SQL Database Changes

Detect suspicious changes to databases in your SQL Server to prevent system unavailability or compromise of sensitive data.

Exchange
How to Detect Who Granted Full Access Permissions to Another User’s Mailbox

Full access permissions should be continuously monitored to minimize the risk of security breaches.

Active Directory
How to Monitor User Logоns in a Domain

Auditing of both failed and successful logon attempts is extremely important because it helps IT pros detect malicious activity before a data breach occurs. test

Changes
These assets explain how to get information about changes to system configurations and data.
MS Teams
How to Audit Changes to Sharing Settings in MS Teams and SharePoint Online

Learn a simple way to keep an eye on changes to SharePoint Online and MS Teams sharing settings to promptly spot risky or malicious actions.

MS Teams
Privilege Escalation Auditing in MS Teams and SharePoint Online

Learn how to audit your SharePoint Online and Teams for privilege escalation and spot malicious activity before it causes real damage.

Microsoft Entra ID
How to Find Illicit Applications in Microsoft Entra ID

Learn how you can detect undesired applications in your Microsoft Entra ID logs, so you can take action before they cause real damage

Exchange
How to Review Mailbox Audit Events in Office 365

Using native Office 365 auditing tools can be time-consuming. Learn how to speed investigations with Netwrix Auditor.

Active Directory
How to View AD logs in Event Viewer

Learn how to read AD logs to keep track of changes to your baselines for critical systems of your infrastructure.

File Servers
How to Monitor Folder for New Files

Learn how to create a PowerShell script to manually monitor a folder for new and updated files, and see how you can streamline the process with Netwrix Auditor.

Active Directory
How to Monitor Active Directory Group Membership Changes

Learn how you can monitor AD group membership changes with native auditing capabilities in Windows Server and with Netwrix Auditor.

SQL Server
How to Check SQL Server View Permissions Changes

Check SQL permission changes and determine who altered view permissions without running any queries and minimize the risk of data exposure.

SQL Server
How to Track Login Password Changes in SQL Server

Track and investigate changes to the login password in SQL Server to prevent account compromise and better secure your critical assets.

File Servers
How to Audit File Permission Changes

Enable file server permission change audit across your Windows servers to track changes to file, folder and share permissions.

Exchange
Monitor Permissions Changes to Exchange Online Public Folders

This how-to shows how to determine who changed permissions to public folders in Exchange Online, so you can improve your sensitive information security.

SQL Server
How to Create a SQL Server Audit Trigger

Create a SQL Server audit trigger for INSERT or UPDATE events and gain visibility into activity across your tables to secure sensitive data.

Active Directory
How to Detect Who Deleted a Group Policy Object

Improper deletion of a GPO can greatly damage the security of your environment. Monitor GPO deletions to facilitate quick recovery and reduce risk of data exposure.

File Servers
How to Audit File Deletion on Your Windows File Servers

Constant monitoring of file and folder deletions is necessary to prevent business disruptions and data loss through quick restoration of data.

Windows Server
How to Detect Modifications to Startup Items in Windows Registry

Suspicious changes to Startup Registry keys can be a sign of malware activity. Timely detection of these changes can prevent loss of sensitive data.

Active Directory
How to Detect Who Enabled a User Account in Active Directory

Constant monitoring of recently enabled accounts enables you to determine who is trying to get unauthorized access to your systems and quickly remediate the issue.

Active Directory
How to Audit Group Policy Changes using Security Log Events

Learn how to audit Group Policy changes with Netwrix Auditor. Monitoring Group Policy logging information helps you prevent security incidents.

SQL Server
How to Detect SQL Database Changes

Detect suspicious changes to databases in your SQL Server to prevent system unavailability or compromise of sensitive data.

Windows Server
How to Detect Who Created a Scheduled Task on Windows Server

This how-to shows two ways of detecting who created a new scheduled task on your windows server.

Microsoft Entra ID
How to Detect User Account Deletions in Microsoft Entra ID

Ongoing monitoring of deleted users in Microsoft Entra ID minimizes the risk of users losing access to systems they need, thus reducing the number of helpdesk requests.

Active Directory
How to Find Out Who Unlocked a User Account

Constantly reviewing which accounts were unlocked and by whom enables IT admins to spot suspicious account lockouts and respond quickly to protect systems and data.

Active Directory
How to Detect Who Modified Permissions to an Organizational Unit

Continuous monitoring of changes to security permissions to an OU enables IT admins to minimize the risk of unauthorized access to IT systems.

Active Directory
How to Detect Who Deleted a User Account in Active Directory

Carefully monitoring all user account deletions enables IT pros to minimize the risk of business disruption and system unavailability.

File Servers
How to Detect Who Tried to Modify a File or a Folder on Your Windows File Server

Continuous review of attempts to modify sensitive files helps you quickly spot suspicious activity to prevent a possible threat before a breach occurs.

SharePoint
How to Detect Who Deleted a File on Your SharePoint

Determining who deleted a file on your SharePoint site can help you investigate unsanctioned action and appropriately respond to it.

SharePoint
How to Detect SharePoint Permission Changes

Ongoing tracking of SharePoint permission changes helps IT administrators detect unauthorized changes so they can quickly roll them back and minimize their consequences.

Windows Server
How to Detect Who Deleted a DHCP Reservation

IT administrators need to monitor deletions of DHCP reservations to ensure no unauthorized changes took place, thus preventing system unavailability.

Windows Server
How to Monitor Deletions of DNS Records

Continuous monitoring of DNS record deletions helps IT administrators detect abnormal actions in a timely manner and thereby avoid service unavailability.

Active Directory
How to Detect Who Deleted a Computer Account in Active Directory

Ongoing tracking of deleted computer accounts by IT administrators is important to avoid authentication errors and lost productivity.

File Servers
How to Detect Who Changed a File or Folder Owner

Every change of a file owner should be tracked by IT admins to secure sensitive data against leaks and unauthorized access and modifications.

Exchange
How to Detect Who Granted Full Access Permissions to Another User’s Mailbox

Full access permissions should be continuously monitored to minimize the risk of security breaches.

Active Directory
How to Detect Who Added a User to Domain Admins Group

To prevent a data breach, it’s critical to ensure that only authorized users are added to the Domain Admins group and thereby get access to critical data.

Exchange
How to Detect Who Modified Mailbox Permissions in Exchange Online

Continuous monitoring of mailbox permissions in Exchange Online enables the timely detection of unauthorized changes, thereby mitigating the risk of security breaches.

Windows Server
How to Detect Software Installations on Windows Server

Netwrix Auditor for Windows Server enables you to detect software installations and get detailed alerts.

Active Directory
How to Detect Changes to Organizational Units and Groups in Active Directory

Ongoing tracking of changes to Active Directory organizational units and groups can help you avoid system downtime, business disruption and loss of productivity.

File Servers
How to Detect File Changes in a Shared Folder

IT pros need to timely detect suspicious file changes to quickly get actionable details for security investigations and spot malicious activity at early stages.

Active Directory
How to Detect Password Changes in Active Directory

Timely detection of password change and password reset in Active Directory enables IT pros to investigate suspicious activity and avoid data leaks and system downtime.

Active Directory
How to Detect Who Disabled a User Account in Active Directory

The ability to quickly detect a disabled user in Active Directory and identify who disabled the account enables IT Pros to investigate the root cause of suspicious activity.

Active Directory
How to Detect Who Created a User Account in Active Directory

To thwart attackers, IT pros must be able to continuously audit changes in the environment and quickly determine who created AD user accounts.

Active Directory
How to Detect AD User Account Changes

Detecting AD user account changes using native auditing is time-consuming. Netwrix Auditor for Active Directory monitors these changes helping you quickly detect intruders.

Access
These assets explain how to find out who is accessing what in your environment.
SharePoint
How to Get a SharePoint Online External Sharing Report

Getting a comprehensive SharePoint Online external sharing report with native tools can be tricky. Learn how to get the necessary details with a couple of clicks.

Microsoft Entra ID
How to Detect Logons Outside of Trusted Locations in Microsoft Entra ID

Finding sign-ins from unusual locations in Microsoft Entra ID can be a challenging task, especially if you have people working from all over the place. Learn an easy way to audit sign-ins in your cloud.

MS Teams
How to Audit Who Accessed What Data in MS Teams and SharePoint Online

Auditing access to data in your cloud is crucial to ensuring the security of your enterprise. Learn a simple way to get a report on who accessed what data.

VMware
How to Detect Failed Logon Attempts to VMware

Failed logons may indicate intrusion attempts. Learn how to detect potentially malicious activity in your VMware environment.

SQL Server
How to Audit SQL Server Logins

Learn how to enable SQL server login auditing using either native SQL Server capabilities or Netwrix Auditor.

Active Directory
How to Find Account Lockout Source

See how you can find account lockout source and the underlying reason using a PowerShell script or Netwrix Auditor.

Active Directory
How to Get User Login History

Get a report about Active Directory user login history with a PowerShell script or Netwrix Auditor. Review both remote and local logons with time and system details.

SQL Server
How to Create a SQL Server Logon Trigger

Create a logon trigger on SQL Server to secure your critical assets. Use the SQL Server logon trigger to audit access events and spot illicit activity faster.

Exchange
How to Monitor Who Accessed a Shared Mailbox

Ongoing review of shared mailbox access events is needed to ensure that no critical business data is exposed or lost because of improper handling of emails.

Active Directory
How to Detect Every User's Last Logon Date in Active Directory

Ongoing audit of each user’s last logon date in Active Directory helps IT pros detect inactive accounts that can be used as back doors by attackers.

Oracle Database
How to Track Down Failed Oracle Database Logon Attempts

Keeping track of failed Oracle Database logon attempts helps IT administrators detect database intrusion attempts.

File Servers
How to Audit File Access on Windows File Servers

Keeping an eye on who reads files on file servers enables IT pros to control access to sensitive data and minimize the risk of information security attacks.

Exchange
How to Detect Who Accessed Another User’s Mailbox in Exchange Online

IT pros need to continually monitor non-owner access to any shared mailbox in Office 365 to ensure data security and minimize risks of data leaks.

Active Directory
How to Monitor User Logоns in a Domain

Auditing of both failed and successful logon attempts is extremely important because it helps IT pros detect malicious activity before a data breach occurs. test

Configurations
These assets explain how to get information about effective permissions and configuration settings.
Exchange
Get a List of Shared Mailboxes Members and Permissions

Learn how to create a summary on all Exchange Online shared mailboxes and see permissions to them using PowerShell or Netwrix Auditor.

SQL Server
How to Check User Roles in SQL Server

Although user roles are a common way of granting permissions, they can be confusing. Learn how to check user roles in SQL Server with a simple query.

Active Directory
How to Get AD User Group Membership with or without PowerShell

Overcome the limitation of PowerShell scripts to get AD user group membership. Create a list of groups a specific user belongs to and export it to CSV.

Active Directory
How to Check AD Group Membership with Command Line

Checking AD group membership with command line is the way to review permissions, but not the only way. Learn different ways to get the required info.

Active Directory
How to Restore Deleted AD Objects

This how-to article explains how the Active Directory Recycle Bin’s object restore works, what limitations it has, and how Netwrix can help you overcome those limitations

Active Directory
How to Find Inactive Users in Active Directory using PowerShell

Learn how to find inactive users in Active Directory using PowerShell or Netwrix Auditor to simplify your AD housekeeping and reduce security risks.

Active Directory
How to Check If AD User Is Disabled

Learn how to check if AD user account is disabled with PowerShell or Netwrix Auditor.

SQL Server
How to Get SQL Server Database Size

Getting the SQL Server database size with T_SQL queries can be tricky without serious scripting skills. Learn how to get the required data with just a few clicks.

Active Directory
How to Check AD Group Membership with Command Line

Checking AD group membership with is one method to review and refine access rights, but not the only way. Learn different ways to get the required information.

VMware
How to Get VMware Account Permissions

Learn an easy way to untangle branchy VMware account permissions without sifting through multiple objects and reports.

SQL Server
How to Get User Permissions in SQL Server

Getting User Permissions in SQL Server with T-SQL Query is complicated, but often required for audits. Learn simple way to get your data.

SQL Server
How To View SQL Server Database File Locations

Learn an easy way to find your Microsoft SQL Server database file location for backup or maintenance purposes.

SQL Server
How to View SQL Server Database Properties

Checking SQL Server database properties regularly is critical to availability and performance, but native methods can be a real pain. Learn a simple way to get this data.

SharePoint
How to Identify Sensitive Data in MS Teams and SharePoint Online

Knowing where your sensitive data is a cornerstone of a strong security posture. Learn how to identify sensitive data in your Microsoft 365 environment.

Windows Server
How to list Scheduled Tasks and Services

Learn how list Scheduled Tasks and Services on Windows machines an easier way using Netwrix Auditor

SharePoint
How to Get a SharePoint Online Permissions Report

SharePoint Online permissions are scattered across multiple menus and settings. Learn how to get a simple report on who can access what in your SharePoint Online environment.

Exchange
How to Get Exchange Online Mailbox Permissions Report

Collecting Exchange Online permissions can be complicated because different permission types are stored differently. Get a clear, complete report on Exchange Online non-owner permissions in just a few clicks.

Active Directory
How to Get AD Groups for Users

Learn how to get a comprehensive report on users’ group membership.

File Servers
How to Locate Files Containing Sensitive Data

Learn how to locate files on your file servers that contain sensitive data so you can ensure compliance and strengthen your security posture.

Active Directory
How to Get Computer Group Membership

Enterprise growth can cause your AD group structure to get quite complex, which can lead to GPO and WSUS policy conflicts. To investigate them, you need to list all Active Directory groups that certain computer account belongs to.

SharePoint
How to Check SharePoint Permissions

Learn how to easily check SharePoint permissions for any account so you can ensure that each user has the proper permissions for their job.

Active Directory
How to Find Last Password Change Date

While troubleshooting an account lockout or investigating an attack, you need to find out when a user last changed their password. Learn how to find the last password change date.

File Servers
How to Find Empty Folders

Having a lot of empty folders on your file shares makes navigation harder for users and complicates provisioning and auditing processes. Learn how to find empty folders so you can clean up your file shares.

Active Directory
How to List AD Group Members

Learn how you can get a list of AD group members in couple of clicks so you can streamline attestation of privileged groups to ensure that only authorized users have administrative rights.

SharePoint
How to Get a SharePoint Permissions Report

Learn how to get a SharePoint permissions report in a few simple steps so you can ensure permissions are aligned with employees’ responsibilities.

File Servers
How to Find Files by Owner

Learn how to search for files owned by a certain user on your file server.

Windows Server
How to List Local Groups

Learn how to list all local groups in Windows Server and export them to CSV format with or without PowerShell.

Active Directory
How to Find Locked Accounts in Active Directory

Conduct regular reviews of locked-out user accounts in your Active Directory to maintain good IT hygiene.

Active Directory
How to Find Expired Accounts in Active Directory

Discover how to get a list of expired user accounts in your Active Directory to reduce your attack surface area and maximize the security of your IT environment.

Active Directory
How to Find Inactive Computers in Active Directory with or without PowerShell

Keep track of inactive computer accounts in your Active Directory to reduce the attack surface area and strengthen the security of your IT environment.

Windows Server
How to Get Local Administrators with or without PowerShell

Find out how to review all local administrators on your Windows machines in order to spot deviations from your baseline and maintain good IT hygiene.

Active Directory
How to Find Disabled Users in AD

Knowing about every disabled user account is crucial if you want to harden the security of your IT systems. Learn how to get a list of disabled users in your Active Directory and export it to a CSV file.

Windows Server
How to Get Local Users with or without PowerShell

Regularly review the local users and groups on critical Windows machines in order to harden the security of your servers.

File Servers
How to Find Duplicate Files

Locate duplicate documents on your file servers to free up storage space and control the spread of sensitive information.

File Servers
How to Find a File and Check If It Exists

Struggling to find sensitive files that are stored in insecure locations? Learn an easy way to find critical data on Windows file servers that might be at risk.

File Servers
How to Count Files in a Directory

Learn how to count the number of files in a folder with PowerShell and how to automate this process with Netwrix Auditor. The PowerShell script on this page shows you how many files are stored in a specific directory.

File Servers
How to Get ACL for a Folder

Learn how to create and use PowerShell script to get ACL for a folder and export report on share permissions.

File Servers
How to Get an NTFS Permissions Report

Learn how to get an NTFS permissions report in a few simple steps to ensure your files are secured properly.

Active Directory
How to Get a List of All Users from a Specific OU

Struggling to get a list of AD OU members? Learn how you can produce a list of all AD users in an OU, with and without PowerShell scripting.

Active Directory
How to List All Computers in an OU

Learn how you can use PowerShell to list all computers in an OU

Active Directory
How to Get a List of Users with Password Never Expires

Learn how to use PowerShell’s Get-ADUser to find users with Password Never Expires

Active Directory
How to Export a Computer List from Active Directory

Learn how you can export a list of computers from AD into various formats, including csv and Excel.

File Servers
How to Export Folder Permissions to CSV File

Export NTFS permissions to stay on top of who has what folder security permissions in your organization and how that access was granted

Windows Server
How to List All User Accounts Without Using CMD or PowerShell

Get a list of users in local groups on Windows machines without using the CMD on each machine or scripting in PowerShell.

Windows Server
How to Collect Server Inventory

Collect system inventory without wasting your time on PowerShell scripting and get details such as OS installed on each server, OS version and antivirus status.

Active Directory
How to Get an Active Directory OU Permissions Report

Spot unnecessary excessive rights and prevent privilege abuse by regularly viewing Active Directory OU Permissions report.

Windows Server
How to Find Shared Folders

Regularly view shared folders reports to get a list of all file shares and identify non-default shares that can jeopardize your data security.

Active Directory
How to Get an Active Directory User Permissions Report

To mitigate the risk of privilege abuse and pass audits, you need to know how to check user permissions in Active Directory and get a detailed report.

Windows Server
How to Get a Local Group Membership Report

Learn how to get a report on the membership of all local groups, including local administrator group membership, in CSV format.

File Servers
How to Detect Who Has Access to What Data on Windows File Servers 

This how-to shows two ways of detecting who has access to what data on Windows file server.

Active Directory
How to Export Group Policy Settings into an Actionable Report

Group Policy settings export with native tools can be a real challenge. But the right software can simplify exporting of Group Policy settings into an easy-to-read report

Active Directory
How to Restore Active Directory Users

Restore Active Directory objects to ensure system availability. Plus, quickly recover deleted AD user accounts and other objects to a previous state without any downtime.

Active Directory
How to Remind Users to Change Their Passwords before They Expire

By sending automatic notifications to users to change their passwords, IT administrators can ensure IT security and reduce helpdesk workload.

Active Directory
How to Export Active Directory Objects to CSV

Because IT admins are often asked to export Active Directory to CSV files, having a solution that can quickly export Active Directory objects can save them time.

Active Directory
How to Export Active Directory Users to CSV

Exporting users from Active Directory with native tools requires time and effort. The right solution enables you to quickly export AD users to CSV

Active Directory
How to Export Members of a Particular AD Group

An Active Directory group membership report shows the members of a particular group. To have this data at hand in a readable format, simply export AD group members to CSV.

File Servers
How to List Everyone Group Permissions

This tutorial will show you how to list Everyone group permissions to help prevent data exfiltration and reduce the insider threat.

Windows Server
How to Enable Video Recording of Changes in Your Windows Server

Video recording of user screen activity enables IT administrators to gain visibility into IT systems and control privileged user activity before a security breach occurs.

File Servers
How to Detect Who Has Direct Permissions to Your File Shares

Regular review of permissions helps IT administrators optimize access control and lock down overexposed data.