Solved

Tracking user login in Active directory

Posted on 2004-04-07
2
2,415 Views
Last Modified: 2008-05-30
We have a small network using active directory. I have a computer that is a Win2k box which someone keeps logging in and changing network settings on. I know I can restrict this from happening, but for the time being, I am looking to see how I can track who is doing this.. like maybe who is logging in and making the changes, anyone know how to find this out?
0
Comment
Question by:sumfknguy
2 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 100 total points
ID: 10778488
HOW TO: Enable and Apply Security Auditing in Windows 2000
http://support.microsoft.com/default.aspx?scid=kb;en-us;300549
0
 
LVL 1

Assisted Solution

by:XionNET
XionNET earned 25 total points
ID: 10778493
In the security policy settings, you can opt to log logons and some accesses to the Security Log of the PDC. The log will show who logged on to where at what time and some other information. Let me know if that helps.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Synchronize a new Active Directory domain with an existing Office 365 tenant
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question