[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Find out when a PC was last used through AD

Posted on 2009-02-11
5
Medium Priority
?
400 Views
Last Modified: 2012-05-06
Hi Guys,
Is there any way of finding when a PC or Laptop last connected or interacted with the domain and by who ?
We have around 112 computers in the OU of which i think only 40 are now used. The others i think are older ones that have been destroyed/ removed etc but i need to make sure they haven't been used in any way for a period of time (say 6 months).
I know there used to be an AD command to do something similar but can't remember what it is or if this would work ?
Failing this any 3rd party tool would help

Cheers
0
Comment
Question by:Netexperts
5 Comments
 
LVL 24

Accepted Solution

by:
ryansoto earned 2000 total points
ID: 23613263
0
 
LVL 19

Expert Comment

by:lamaslany
ID: 23613403
If you are just after expired computer accounts my first link will do the job  If any machine accounts have not contacted AD for six months their computer account passwords will probably have expired in any case!  Saves you $99.  
0
 
LVL 1

Author Closing Comment

by:Netexperts
ID: 31545646
That response was too quick to be believed !!
Points to ryansoto as we have a windows 2000 native domain and dsquery didn't work. But thanks for the response.
0
 
LVL 18

Expert Comment

by:Americom
ID: 23613520
We have Enterprise Security Reproter from www.scriptlogic.com. It's not cheap but can pretty much allow you to run report against your AD almost anyway you want. You can find out all PC not connected to your AD 30, 60, etc days. Of course this product also allow you to run report on a lot of other security related info of your AD objects as well as file server security etc.

Here's a screen capture as to what this product can do for you:

ESR.bmp
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Wouldn't it be nice if objects in Active Directory automatically moved into the correct Organizational Units? This is what AutoAD aims to do and as a plus, it automatically creates Sites, Subnets, and Organizational Units.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question