[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 133
  • Last Modified:

Looking for a possible hacker..?

Hey all.

Let me give you a quick overview of the situation.  We are in a windows 2000 environment: servers and desktops.  We have an employee who runs queries via an access database to a db2 server offsite maintained by a third party vendor.  

We have noticed that when this employee leaves the office durning the week; someone tries to view that access database and ends up locking the account out to the db2 server with repeated unsuccessful logins.  We think it is someone internally who is doing this and just not confessing to it.  

My question is this:  Is there a way to track a user (inside or outside our domain) who might be accessing the particular access database and locking out the db2 account with their unsuccesful logon attemps?  Is there something internally to Windows 2000 or a 3rd party software that can do this?

Thanks for anyone's help.
0
Ash57
Asked:
Ash57
1 Solution
 
AndresMCommented:
You could enable auditing for the access database file.
Select the .mdb, properties, security, advanced, auditing, and add everyone to the list.
Hope this helps.
0
 
Ash57Author Commented:
AndersM - I will give that a try.
0
 
AndresMCommented:
After you enable auditing, you can see the log in event viewer - security tab.
0
 
mikecrCommented:
I would agree with AndresM. This will probably pick out your culprit.
0
 
narendrakumar1978Commented:
Hi,

First u just enable Auding which is in windows nt inbuid.Just enable and view the details from Event Views.

And also try to get the Management software which will track inbout and out bound connections.

Go to google.com and type network management tools and download and enjoy...

narendra
0

Featured Post

Get expert help—faster!

Need expert help—fast? Use the Help Bell for personalized assistance getting answers to your important questions.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now