Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

tracing malicious letter

Posted on 2009-04-05
1
Medium Priority
?
370 Views
Last Modified: 2013-12-06
I received a malicious letter from someone in my office (headed stationery) and I wish to identify which computer it was printed from. As it was a short letter and was unlikely to be saved, I want to know if it is possible to trace it via the print server.
0
Comment
Question by:melly2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 58

Accepted Solution

by:
tigermatt earned 1000 total points
ID: 24073010

The default configuration of a Windows Server is that it will log all Print jobs which are printed through the server. You would need to look in the Event Viewer at the System log, filtering by events with source 'Print'.

You cannot see which computer the print was initiated from, but you can see the user who initiated it and the content of the log allows you to identify the particular printer which the logged print job was sent to. Using this information, you can look for matching event logs between the date/times around when the print job was sent.

-Matt
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration, of the HP EVA 4400 SAN Storage. The name , IP and the WWN ID’s used here are not the real ones. ABOUT THE STORAGE For most of you reading this, you …
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question