Solved

audit...

Posted on 2001-06-18
4
132 Views
Last Modified: 2012-05-04
Is there a way I can check to see who has logged or tried to log into my computer from my terminal or try to login with my userid and password elsewhere on the network?

scorp8
0
Comment
Question by:scorp8
  • 2
  • 2
4 Comments
 
LVL 4

Expert Comment

by:tengage
Comment Utility
Do you have security audits turned on at your terminal?
0
 
LVL 1

Author Comment

by:scorp8
Comment Utility
I have no clue!!!  

Where would I go to check?
0
 
LVL 4

Accepted Solution

by:
tengage earned 20 total points
Comment Utility
If you go to start | program | administrative tools | event viewer, and open the "security" log.

You may see "success audits".  These will show you when and who logs into your machine.

If you don't have any audits in here and you want to turn 'em on, then do this

1. Launch "Local Security Settings" from Control Panel
2. Expand Local Policies
3. Click "Audit Policy"
4. Double Click "Audit Logon Events"
5. Click the "success" and "failure" checkboxes

You'll now see entries in your security log in event viewer for "who logged on and when"

- Chris

0
 
LVL 1

Author Comment

by:scorp8
Comment Utility
Your winnT, right?  I'm in win2000 but I found all the settings and set them up...

Thanks for the help...
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
HOW TO: Install and Configure VMware vSphere Hypervisor 6.5 (ESXi 6.5), Step by Step Tutorial with screenshots. From Download, Checking Media, to Completed Installation.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now