Solved

How to trace where a login attempt occurs

Posted on 2004-04-14
3
588 Views
Last Modified: 2012-06-21
I am looking to find out where you can find a log on what ip address or machine someone tries to login in from with a certain username in a domain.

i.e. A certain username gets locked out because someone on the domain tries to login with the username more than three times.

I am wanting to find out what ip address and what machine the login in attempts are coming from.

sorry for low points, please help.

Thanks.
0
Comment
Question by:micahy2k
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Accepted Solution

by:
following earned 80 total points
ID: 10827455
If using Active Directory, enable auditing in the Default Domain Controllers GPO (Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policies).  For your purposes, I would turn on Failure auditing for at least "Audit account logon events" and "Audit logon events".  Then, in the Security log in the Event Viewer, you will be able to see events registered for failed logon attempts.  A computer name (or IP address) and username will be reported in the info.  I would recommend increasing the size of the security log so that you don't lose any events.

Hope this helps,
-jdm
0
 
LVL 10

Expert Comment

by:timothyfryer
ID: 10831151
This place has some neat tools if you want to go check the guy out once you find him.  Just found this site so not sure if any of them log or not but they're still pretty neat.
http://www.ks-soft.net/ip-tools.eng/index.htm
0
 

Author Comment

by:micahy2k
ID: 10832752
Thanks for all the help!!!!!!
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
In this article we will discuss all things related to StageFright bug, the most vulnerable bug of android devices.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question