Solved

How To Get MAC Address (PC is Shut-down) From Logs, Command Prompt ..anything

Posted on 2007-04-07
3
1,776 Views
Last Modified: 2013-12-05
Dear Experts,

I would need to wake a PC remotely using its Mac Address.

Problems:
1) I don't know the mac address
2) The PC is currently switched off
3) The PC, when on, has a Fixed IP address, so in the DHCP cache
    of the domain controller doesn't appear

What I have:
1) Access to a Windows 2003 domain controller
2) running MS-SQL, Exchange, DHCP, DNS, Active Directory and so on
3) I'm the administrator

normally and arp -a would do... but the PC is currently switched off...so i guess the only way to find
out is to query some logs...or look some properties in Active directory... but Couldn't find anything so far.

As said, the DHCP service would help as it gives the last assigned IP and MAC address...but the PC ha a fixed IP assigned...so no record in there..

Thx!
0
Comment
Question by:dcrudo
3 Comments
 
LVL 7

Accepted Solution

by:
pkutter earned 250 total points
ID: 18868880
If you know what port it's plugged into on a switch and you have managed switches you could show the mac table on the switch.

I realize this probably doesn't help you now, but in the future it may. I run OCS network inventory and it will show mac addresses of all machines that are being monitored as of last time the machine was queried (usually about a day).
http://ocsinventory.sourceforge.net/
0
 
LVL 1

Author Comment

by:dcrudo
ID: 18869265
Hi...

thx...yes...maybe in the future would be a good idea ;)
0
 
LVL 74

Assisted Solution

by:Jeffrey Kane - TechSoEasy
Jeffrey Kane - TechSoEasy earned 250 total points
ID: 18869314
Hopefully this guy's utilities can help you out here:
http://www.codeproject.com/useritems/WOL.asp

If you are running ISA Server though, you should find the MAC address in the outbound Internet access logs.

Jeff
TechSoEasy
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now