Solved

Windows 2000 Server User List

Posted on 2003-12-04
5
168 Views
Last Modified: 2013-12-04
Maybe I have missed it, but is there any utility in W2000 Server that allows the admin to view all the current users logged on, the time they logged on, machine, IP, etc? All on one screen! If not, can anyone suggest a third-party package?
0
Comment
Question by:tjdusa
  • 2
5 Comments
 
LVL 10

Expert Comment

by:BloodRed
ID: 9879231
God I wish.  If anyone's got a 3rd party app for this please let me know as well...
0
 
LVL 6

Accepted Solution

by:
Joseph_Moore earned 200 total points
ID: 9879492
Well, running NET SESSIONS from the Command Prompt will give you the active logged in users. Say all of your users authenticate to a single Win2K domain controller. Run NET SESSIONS and you will have all of the pipe requests for each authenticated user.
As for the log in time, I run a line in my users login scripts that writes the username, computername, date and time to a log file. In the Windows Resource Kit is NOW.EXE which is basically date, time and Echo all rolled into one. So, I run this line in my user login scripts:

NOW.EXE -- %USERNAME% -- %COMPUTERNAME% >>\\SERVER1\SHARE\USERLOGFILE.TXT

And that gives me my running log of who logged in when on what machine. I've done this for 2 years now at my current company, and I have a lot of history. But it is really useful. Good to search through.
0
 
LVL 10

Expert Comment

by:BloodRed
ID: 9879521
That's a good idea, defiently better than searching through event logs for user logon events.  Does this work for environments with multiple Sites and DCs?  I assume you could just point the logfile to the save location to append all data to the same file.  I wish MS would include this as a feature like Novell...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cyber Security Requirements 6 106
Monitoring software... 2 52
Changing the domain admin password 9 73
UAC Controls - confused 9 78
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now