Solved

How can I log IP address of failed remote logons?

Posted on 2006-11-07
2
180 Views
Last Modified: 2010-04-11
I have denied access to a user (disabled account). I am still seeing remote logon failures for this account in event log. I would like to ability to log the originating IP address of these remote logons in case we need to take this farther. How can I do this?
0
Comment
Question by:FIFBA
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Expert Comment

by:PowerIT
ID: 17890920
A little more info please. Is this to a specific (intranet) application, to a VPN, to fileshares, terminal servers, client PC etc ...
Also: what is the architecture: firewall, operating systems, etc ... would be helpfull.

J.
0
 
LVL 5

Accepted Solution

by:
darrenakin earned 250 total points
ID: 17891049
Go to your Event Log and look at the failed attempts, it will have the IP listed here
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month10 days, 18 hours left to enroll

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question