Solved

Audit User log on

Posted on 2004-09-20
2
153 Views
Last Modified: 2013-12-04
I have a user who thinks he shut his computer off on Friday and when he came in Monday, his computer was logged in. I need to check if his login mane was used on Sunday. He is a domain user on a 2000 - 2003 domain. He has no security logs on his computer. On the domain controller there are security logs with messages for Sunday for various things. The problem is that there are many user names with these messages for Sunday. No one was here on Sunday. Are these messages normal even though no one is logging in and out? How can I check to see the last time this user logged in?

User Logoff:
       User Name:      userA
       Domain:            ABC
       Logon ID:            (0x0,0x387ED1D)
       Logon Type:      3

Special privileges assigned to new logon:
       User Name:      userA
                Domain:            ABC
       Logon ID:            (0x0,0x38AB692)
       Privileges:      SeChangeNotifyPrivilege
                  SeBackupPrivilege
                  SeRestorePrivilege
                  SeDebugPrivilege
0
Comment
Question by:mspolter
2 Comments
 
LVL 12

Accepted Solution

by:
zvitam earned 350 total points
ID: 12105343
look the the follwing URL you have a complete list of all security event IDs, look for event 528 to see when this user logged on, and event 538 to when he logged off.

http://www.privacywindows.com/securityfaq/security_systems.html
0
 

Author Comment

by:mspolter
ID: 12105911
There are 538's in the log for my name for yesterday (Sunday) and I was not here - no one should have my password - so how would there be successful log on and offs by themselves. My computer was left logged in over the weekend. Does kerberos renegotiate by itself if you are logged in and so to say relog in and out which would be logged, or did someone steal my username and password (which I would say is very unlikely)
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question