Solved

Limiting User Login Times

Posted on 2003-12-04
7
470 Views
Last Modified: 2010-04-13
Hello everybody,
I am experiencing problems with people logging into other peoples computers and screwing things up. This is at a site where people are working 24/7. Due to funds there are only 4 computers and they are all on a workgroup, there is no server.

On one of the computers people are logging into that users account and deleting his/her files. The problem is the user will not listen to reason and keeps on giving out her password, and the security guard will not tell anybody who is gaining access to the computer. Quite a situation, I know, but we're working with an organization who doesn't seem to care for their own rules.

So what I was hoping to do was prevent anyone from logging onto that computer during a certain time frame. The OS is Windows 2000 Pro. I don't think it is possible to do it unless it is part of a domain, but does anybody know of a way that I'm not thinking of? How about some free/really cheap 3rd party software that will do this?

I'd like to avoid this user from being locked down so tight that he/she cannot do anything on the computer.

Thanks in advance,
Tekkie Geek
0
Comment
Question by:tekkiegeek
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 250 total points
ID: 9875953
A command like this format should work

Net user "name of the user" /time:M-F,08:00-12:00

Sunray
0
 
LVL 4

Expert Comment

by:Vinnnnie
ID: 9876136
You should really get either Windows 2000/2003 Server as this is something you can specify for each user. You can specify what the login/logout times are. Very useful. You can download an Evaluation copy of 2003 Server from the Microsoft Site. Without a Server, there's not a whole lot you can do.
0
 
LVL 6

Expert Comment

by:Casca1
ID: 9876194
If the user is giving out her password, then there is nothing you can do, short of locking her down. Even that won't truly help, as any files they can create, even if totally locked down, the same user can also delete.
Even in a domain, this would be an issue, though you might be able to tighten things up to the point of narrowing down who could have done it.
 You might still be able to narrow it down some, by implementing auditing on all PC's.
That way, you would know by logons who had accessed the other PC's legitimately at the same time that the files were deleted.
Not much of a solution, but if the user won't stop giving out her password, My response would be cry me a river... 8-)
Essentially, it would be like calling the cops because you were robbed while you were gone, having left the front door wide open, lights on, and a note telling where the valuables are... 8-)
0
Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

 
LVL 6

Expert Comment

by:Casca1
ID: 9876302
In retrospect, even in a domain environment, there is only one way to prevent this situation, and that is limiting logon times. But, there is even a step further you can make.
 Make the user s liable (In a domain) for anything done on the network; Email, file storage, etc. Then make it a company policy to remove access if repeated violations of policy occur. Make secure, private passwords policy, and you should be able to nail both users.
You might not be able to do anything, and management might ignore you, but you can document what has been done and why, and if push comes to shove and they show YOU the door, having documented proof will at least prevent them from denying unemployment, and also give you a leg to stand on for suit. I mean, really, you have to look at worst case scenario's. If the user gives out the password, and some other user uses it to commit company or legal violations, you could be held responsible, if your the IS/IT guy. That includes file sharing or P2P programs with illegal material shared. Or sensitive data stolen. You would be in the hotseat, and with no documentation, the one left holding the bag.
Hmmm... Doomsday never sounds good, but you have to at least LOOK at the possible outcomes.
Even Libraries are worried about the DCMA, and they pretty much keep their systems locked down.
You run open systems with full access. If legal trouble happens, is the company going to say, our bad, it was our policies (Lack thereof) and our unwillingness to enforce same that led to the breach, or are they gonna say
We thought <TekkieGeek> was following the rules and doing his job.
I don't know about you or where you work, but I wouldn't trust MY boss to cover MY butt!
0
 
LVL 1

Author Comment

by:tekkiegeek
ID: 9878514
Thanks sunray, that is what I was looking for

Casca, don't worry, most of the stuff you are warning me about doesn't apply to me, I have my butt covered.
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9878547
Cool

Sunray
0
 
LVL 6

Expert Comment

by:Casca1
ID: 9878626
Cool, just a thought... Who, Me Paranoid? 8-)
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article describes how to import Lotus Notes Contacts into Outlook 2016, 2013, 2010 and 2007 etc. with a few manual steps. You can easily export and migrate Lotus Notes contacts into Microsoft Outlook without having to use any third party tools.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question