?
Solved

How to get a list of User names and their associated Computer name?

Posted on 2006-10-20
4
Medium Priority
?
133 Views
Last Modified: 2010-04-13
Hey all; is their a way or a utility that will give a report that lists all user names in a Domain as well the computer name they log into.

Thanks.
0
Comment
Question by:Italia_NYC
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 9

Expert Comment

by:gopal_krishna
ID: 17777230
typo error sorry
0
 
LVL 85

Accepted Solution

by:
oBdA earned 375 total points
ID: 17780137
Try it with Sysinternal's PsLoggedOn (note that it supports a -d switch that's undocumented on the web site to scan a domain): http://www.sysinternals.com/Utilities/PsLoggedOn.html
0
 
LVL 9

Expert Comment

by:SamuraiCrow
ID: 17786864
I usually collect this information in my login script.  I add a few lines that go something like:

echo %username,%computername% > \\servername\sharename\%username%.txt

If you want to keep a running tally for tracking purposes and have everyone in the same workbook you can use the same syntax to append a single document:

echo %username,%computername% >> \\servername\sharename\Filename.csv

I also use this to collect MAC and IP Address info

Crow
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question