Solved

how do you know who is logged on to a local gc

Posted on 2008-06-17
5
255 Views
Last Modified: 2010-04-18
i havea  new gc at a location and i want to see if anyone is loggin into it how would you do this
0
Comment
Question by:zenworksb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 24

Expert Comment

by:ryansoto
ID: 21805826
Do you mean a domaon controller not a GC (global catalog)?

You can go into the security logs in event viewer and look for the log on and log off events.
0
 
LVL 13

Accepted Solution

by:
ScooterAnderson earned 500 total points
ID: 21805838
Open ComputerManagement and go to SharedFolders:Sessions.  That will show you who/what computers have an open connection to your server...

It's a bit more cryptic, but you could also open a command prompt and issue:
netstat -ano

and view the actual TCP & UDP connections open/time-wait on your server.
0
 

Author Comment

by:zenworksb
ID: 21806191
why would the users not be logging into the local DC i have a server in there location as a GC and in sites and services dedicated the subnet for them
0
 
LVL 24

Expert Comment

by:ryansoto
ID: 21806215
the local clients should be contacting the local DC as long as it was set up in sites and services correctly.
You created a new site then added that DC to the site?
0
 

Author Comment

by:zenworksb
ID: 21806798
yes and made it a GC
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question