Solved

Printing auditing - Using the event logs

Posted on 2008-06-19
3
1,229 Views
Last Modified: 2013-12-04
Hi there,

I have a print server where our network printers are located. At the moment i want to audit a Colour printer to see who prints to it. Is there an easy way to archive this  ?

The way i have it set up at the moment is to set auditing security on the printer and then check the security logs..this is not giving me the correct info!

Is there a way of filtering the "system" logs for print jobs sent (event id 10) to a specific printer ?

Thanks in advance.. also is there any free software out there to help?

0
Comment
Question by:diawabank
3 Comments
 
LVL 38

Accepted Solution

by:
hdhondt earned 250 total points
ID: 21872386
If the printer is networked (with its own NIC), you can download HP's WebJetAdmin or Xerox' CentreWare Web. I prefer the latter because it is easier to use and has a cleaner interface; however it requires a PC with at least 1GB and the latest version of XP or 2003. Both of these packages will find the printers on your network, and tell you how many pages are printed, but but not who does the printing.

Most networked Xerox printers have built-in job logs that tell you everyting about the print jobs, including user and file names, and even how much toner was used.

If your printer is not networked then I don't know of any free software that will successfully log the jobs. Some paid packages like PrintAudit claim to do it, but I've yet to see a demonstration. I have tried FMAudit, and it did not do it successfully.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Permission issue? 10 73
Using cipher to decrypt files. 4 79
full control root but more restrictive lower permissions 1 36
IR 1023 Scanning 4 22
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question