Solved

audit...

Posted on 2001-06-18
4
133 Views
Last Modified: 2012-05-04
Is there a way I can check to see who has logged or tried to log into my computer from my terminal or try to login with my userid and password elsewhere on the network?

scorp8
0
Comment
Question by:scorp8
  • 2
  • 2
4 Comments
 
LVL 4

Expert Comment

by:tengage
ID: 6202996
Do you have security audits turned on at your terminal?
0
 
LVL 1

Author Comment

by:scorp8
ID: 6203021
I have no clue!!!  

Where would I go to check?
0
 
LVL 4

Accepted Solution

by:
tengage earned 20 total points
ID: 6203134
If you go to start | program | administrative tools | event viewer, and open the "security" log.

You may see "success audits".  These will show you when and who logs into your machine.

If you don't have any audits in here and you want to turn 'em on, then do this

1. Launch "Local Security Settings" from Control Panel
2. Expand Local Policies
3. Click "Audit Policy"
4. Double Click "Audit Logon Events"
5. Click the "success" and "failure" checkboxes

You'll now see entries in your security log in event viewer for "who logged on and when"

- Chris

0
 
LVL 1

Author Comment

by:scorp8
ID: 6203165
Your winnT, right?  I'm in win2000 but I found all the settings and set them up...

Thanks for the help...
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question