Solved

log file storing ip address accessing w2k server

Posted on 2001-07-29
14
147 Views
Last Modified: 2010-04-13

I have a w2k machine open out for access to the internet. Is there a log file in win2000 server keeping track of machine ip address accessing my server. If no, can anyone tell me how can i go about doing that.
0
Comment
Question by:kyh74
  • 9
  • 4
14 Comments
 
LVL 6

Expert Comment

by:Portang
ID: 6332029
For FTP and HTTP, see:

\WINNT\System32\LogFiles\......
0
 

Author Comment

by:kyh74
ID: 6332761
Im running a dedicated game server(counter strike)which doesnt have logfile that record ip address. Looks like i need to write my own script to track ip address.
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6333245
KY, you can't log addresses in any of the MS server products except for IIS and Exchange 2000 Server. Anything else requires 3rd party software and/or a firewall product that enables IP logging.

Dennis
0
 

Author Comment

by:kyh74
ID: 6337071
Hi dew_associates
any 3rd party software to recommend.
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6341265
Sure, just give me an idea of the size of the network so I can find something reasonable, if not free.
0
 

Author Comment

by:kyh74
ID: 6378857
sorry for not replying, i just came back from a trip.
anyway what do u mean by size of the network. I only have one game machine connected to my ISP.
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6379584
Oh okay. Then is it a server and if yes, is IIS installed?
0
Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 

Author Comment

by:kyh74
ID: 6380197
no other services is running. Only dedicated to game server only.
0
 
LVL 25

Accepted Solution

by:
dew_associates earned 50 total points
ID: 6381453
Without some form of Internet service running, there's no way to log the users hitting the server. IIS would be your cheapest bet.
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6424227
Or a good firewall (you good make one out of a junk machine) that you could use as a proxy/firewall.
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6447613
kyh74???
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6468582
kyh74???
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6485309
You could just set up auditing on your machines.  Launch the User Manager on your workstation(s), select Policies | Audit | Audit These Events and check Success for the Logon and Logoff events.

Checking Failure for the same events will give you an idea if people are trying to login where they're not supposed to.

BTW, don't go "audit-happy," by enabling auditing for all the listed events, as auditing can add quite a bit of system overhead, especially in the case of the File and Object Access and Process Tracking events.
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6485693
Thanks for the "B"~!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Lotus Notes – formerly IBM Notes – is an email client application, while IBM Domino (earlier Lotus Domino) is an email server. The client possesses a set of features that are even more advanced as compared to that of Outlook. Likewise, IBM Domino is…
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now