Solved

Firewall says: Windows NT Logon Application (winlogon.exe) is trying to broadcast to [...]

Posted on 2004-09-22
5
6,423 Views
Last Modified: 2013-11-16
Is it okay if I allow Windows NT Logon Application (winlogon.exe) to broadcast from my machine to another IT address?

I have Windows XP Pro on my machine.

I'm not sure what it's trying to log onto.

It's an individual machine connected directly to the Internet via a DSL modem.
0
Comment
Question by:searcherguy
  • 2
  • 2
5 Comments
 
LVL 65

Accepted Solution

by:
SheharyaarSaahil earned 500 total points
ID: 12128825
Hello searcherguy =)

Nopes i dont think so that its Normal... coz winlogon.exe is abt the login and logout procedures,,,, and why wud it connect to another system.... :-?

I dont think so that u shud allow this, unless u Recognise the IP address to which it tries to connect !!
0
 

Author Comment

by:searcherguy
ID: 12128927
Thanks SheharyaarSaahil,

Any idea how to disable this, make it stop logging me onto another machine?

Pretty concerning if my computer thinks its a client on someone else's WinNT server.
0
 

Author Comment

by:searcherguy
ID: 12128930
Also, if this is some bad person doing bad things here, is there a way to go after them based on the IP address perhaps?
0
 
LVL 65

Expert Comment

by:SheharyaarSaahil
ID: 12128958
is ur computer updated fully,,, i mean all Security patches are installed ??
0
 

Expert Comment

by:CoraPanther
ID: 13233362
Actually no.  This is not a security risk.  The firewall you probably have, ZoneAlarm actually defaults to having winlogon, userinit, to be able to allow its child processes to access the internet.  If you turn on advanced and block them then you will have difficulty accessing the net.

Please go here.

http://www.dslreports.com/forum/remark,8976799~mode=flat

If you disable these processes you will be unable to access your internet connection.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now