?
Solved

Looking for a possible hacker..?

Posted on 2002-03-08
5
Medium Priority
?
129 Views
Last Modified: 2012-05-05
Hey all.

Let me give you a quick overview of the situation.  We are in a windows 2000 environment: servers and desktops.  We have an employee who runs queries via an access database to a db2 server offsite maintained by a third party vendor.  

We have noticed that when this employee leaves the office durning the week; someone tries to view that access database and ends up locking the account out to the db2 server with repeated unsuccessful logins.  We think it is someone internally who is doing this and just not confessing to it.  

My question is this:  Is there a way to track a user (inside or outside our domain) who might be accessing the particular access database and locking out the db2 account with their unsuccesful logon attemps?  Is there something internally to Windows 2000 or a 3rd party software that can do this?

Thanks for anyone's help.
0
Comment
Question by:Ash57
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 10

Accepted Solution

by:
AndresM earned 200 total points
ID: 6850866
You could enable auditing for the access database file.
Select the .mdb, properties, security, advanced, auditing, and add everyone to the list.
Hope this helps.
0
 

Author Comment

by:Ash57
ID: 6850915
AndersM - I will give that a try.
0
 
LVL 10

Expert Comment

by:AndresM
ID: 6851021
After you enable auditing, you can see the log in event viewer - security tab.
0
 
LVL 17

Expert Comment

by:mikecr
ID: 6851936
I would agree with AndresM. This will probably pick out your culprit.
0
 
LVL 2

Expert Comment

by:narendrakumar1978
ID: 6856077
Hi,

First u just enable Auding which is in windows nt inbuid.Just enable and view the details from Event Views.

And also try to get the Management software which will track inbout and out bound connections.

Go to google.com and type network management tools and download and enjoy...

narendra
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
New style of hardware planning for Microsoft Exchange server.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question