Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations biv343 on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Logging Windows Security Events

Status
Not open for further replies.

keepsmilin456

IS-IT--Management
Apr 16, 2003
82
We have about 100 servers in our organization and about 30 developers which of about 20 have the domain "administrator" account password. Not good. We need to change this password ASAP, but before we do this, we need a way to figure out who is using this account. All the developers use a terminal service connection to log into servers using their PC's. Is there a way to track IP addresses or host names?

I know the Domain Controller logs all security events, but it only tells me if they logged in using their OWN account and some events do not record where the connection was initiated from.

3rd party solutions I've checked out:
LANguard S.E.L.M - just cleanly lists security events from Windows boxes & generates reports but does not list which machine it came from.

Greyware Logon Monitor - just records user logon/logoff but does not list which machine it came from.

Any ideas?
 
Quick and dirty way, if you go in Computer mgmt-->Sessions it will show all occurence of who is logged as the Domain Admin and from what IP/Host
 
Yeah, I've found that already...btw for that, is there a way to real-time monitor that? Does it get stored in some type of log file? If so, where?

Any other suggestions from anyone else?
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top