Usefull Intrusion Information

Posted on 2006-05-17
Last Modified: 2010-04-11
I am a domain admin (one of several) for a company who provides desktop support to it's users.  For all intensive purposes, most of the machines on our domain follow a standard naming convention.  I would like to know in very simplified terms, what other computers have accessed or attempted to access my computer and who was logged in at the time.  What they did would be an added benefit but I don't want to bog myself down in information I may not know how to interpret.  What is the best way to go about doing this?
Question by:tedpenner
    LVL 5

    Accepted Solution


    this may help u out..

    LVL 11

    Expert Comment

    Finding out who was logged in at the time is easy

    Nbtstat -A ip address will return the name of hte pc along with the logged in user at the time as the <03> record

    You can script this action in conjunction with a number of tools which watch connections to your machine and kick off actions.

    Author Comment

    Renill, that is one long list??

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How your wiki can always stay up-to-date

    Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
    - Increase transparency
    - Onboard new hires faster
    - Access from mobile/offline

    By default, Carbonite Server Backup manages your encryption key for you using Advanced Encryption Standard (AES) 128-bit encryption. If you choose to manage your private encryption key, your backups will be encrypted using AES 256-bit encryption.
    Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now