Solved

How can I find out who turned off a service?

Posted on 2004-04-29
5
192 Views
Last Modified: 2013-12-04
Someone apparently looged into one of my companies servers and turned off the Veritas Backup service and my Exchange job failed, where can I find exactly who did this.  Thanks all...

Sorry to sound like a newbie, but I want to get a really accurate answer to this question as well as any short cuts or suggesstions  from folks who are experienced investigators of this type of scenario.
0
Comment
Question by:copio
5 Comments
 
LVL 16

Assisted Solution

by:JamesDS
JamesDS earned 100 total points
ID: 10948218
copio
Unless you have "privelidge use" auditing switched on the server in question, it is impossible to tell.


Cheers

JamesDS
0
 
LVL 67

Accepted Solution

by:
sirbounty earned 150 total points
ID: 10948277
Well, it's easier if you have some sort of system logging/auditing enabled, which isn't, by default, I'm afraid.
However, if you have a time range in mind - and if they did it locally, you should be able to match up the security logs from your server's EventVwr with the time an administrative account logged on.

But backing up a bit - what makes you think someone actually stopped it?  BE services crap out sometimes.  Have you checked the eventvwr system logs and application logs for anything related to Backup Exec?  Perhaps an error log was generated - also check %systemroot%\drwtsn32.log or %systemroot%\system32\drwtsn32.log (I forget exactly where it's stored - so performa search).

If you're using Windows 2000 or above, you can also check the Recovery tab to have it restart after a failure (but you probably already know this).

Which service exactly was it?
0
 
LVL 12

Assisted Solution

by:trywaredk
trywaredk earned 150 total points
ID: 10948423
HOW TO: Enable and Apply Security Auditing in Windows 2000 Server and Windows 2000 Professional:
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q300549&sd=tech

Event Log View EVT - analysis tool for rapid search through 64 archived logs
http://www.engagent.com/products/productsinfo.asp?product=event+log+view+evt

Sentry II enables you to manage and monitor your Windows NT/2000/XP/2003 event logs.
http://www.engagent.com/products/productsinfo.asp?product=Event+Log+Sentry

Proactively Monitor, Alert and Recover critical applications, servers and infrastructure equipment
http://www.ipmonitor.com/

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 

Author Comment

by:copio
ID: 10949413
Everyone provided great feedback, thank you all for your assisatance.  The service that was tunred off was the Backup Exec Agent on a remote Exchange server.  And I couldn't locate who the culprit was, but I wil put into place some of the suggestions given here to prevent this in the future. Thanks.
0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10967102
:o) Glad we could help you - thank you for the points
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question