Solved

Track and log user login and logout

Posted on 2008-06-13
5
7,551 Views
Last Modified: 2013-11-21
What is the best way to track and log user login and log out on a Terminal Server.  We need this in order to be able to report to HR how much time remote users use the Terminal server.
0
Comment
Question by:menreeq
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 8

Expert Comment

by:pzozulka
ID: 21783400
Your Event Log Management Solution for Compliance, Security and More

http://www.tntsoftware.com/Products/ELMLogManager.aspx
0
 
LVL 8

Expert Comment

by:pzozulka
ID: 21783413
0
 
LVL 8

Accepted Solution

by:
pzozulka earned 500 total points
ID: 21783421
ELM Event Log Monitor includes a pre-configured Audit - Logon/Logoff Activity Report which can be scheduled to run daily/weekly....and sent to a shared File/Folder.
0
 

Author Closing Comment

by:menreeq
ID: 31467115
Thanks, we decided to try this one first as it seems a bit less involved:

https://www.greyware.com/software/logonmon/index.asp
0
 
LVL 15

Expert Comment

by:Praveen Venu
ID: 23226550
Write Windows service, you will get  Login/Log off  sessesion change  in  
protected override void OnSessionChange(
                  SessionChangeDescription changeDescription)
        {


   if (changeDescription.Reason == SessionChangeReason.SessionLogon)
            {
              //  write information to file/table
            }
            if (changeDescription.Reason == SessionChangeReason.SessionLogoff)
            {
              //  write information to file/table
            }
 
        }
 
 and install this in your remote server machine.
http://www.codeproject.com/KB/system/WindowsService.aspx?display=PrintAll&fid=313910&df=90&mpp=25&noise=3&sort=Position&view=Quick&fr=126
 
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Server 2012 R2 SChannel Error 57 100
Windows 10 Policy for Flash 3 59
PowerShell:  foreach where object notmatch? 17 83
Active directory DNS integrated question? 7 46
While rebooting windows server 2003 server , it's showing "active directory rebuilding indices please wait" at startup. It took a little while for this process to complete and once we logged on not all the services were started so another reboot is …
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question