?
Solved

Monitoring RWW Connections on SBS Server

Posted on 2009-05-08
9
Medium Priority
?
940 Views
Last Modified: 2012-06-21
I want to see who has connected through RWW on my usage reports.  My usage report gives me Mailbox and OWA information but nothing regarding RWW.  

I have IIS checked on the usage report.  

0
Comment
Question by:merikm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
9 Comments
 
LVL 26

Expert Comment

by:DrDave242
ID: 24338517
From what I've read, there's no built-in RWW usage report.  There are third-party products for it, though.  The first one I ran across is RWWGuard, which looks like it does a few other things as well:

http://www.scorpionsoft.com/products/rwwguard/
0
 

Author Comment

by:merikm
ID: 24454109
where can you do access logging?  To see from an active directory standpoint, when people are logging on and what they are accessing.  Maybe as an alternative to RWW reporting.
0
 
LVL 26

Expert Comment

by:DrDave242
ID: 24474467
You'll need to enable auditing on the SBS server.  To do this, go to Start > Admin Tools > Domain Controller Security Policy.  Expand Local Policies and click Audit Policy.  You'll see nine different items in the right pane that you can enable as you please.  Since you're actually modifying a GPO with these settings, any changes won't take affect until Group Policies are updated.  You can wait for this to happen automatically, or you can force it with the gpupdate command.  Also note that any other DCs you have in this domain will be affected by these settings as well.  Finally, the actual audit events are recorded in the DC's security log, and enabling some audit policy settings (especially if you choose to audit successes and failures) can result in a LOT of events being logged.  This can make sifting through the security log cumbersome and can fill up the log completely.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:merikm
ID: 24474517
so this is supposed to set all network accesses, like file access and such to show up in the security log?
0
 
LVL 26

Expert Comment

by:DrDave242
ID: 24474769
Anything you enable in that policy will show up in the security log, yes.
0
 

Author Comment

by:merikm
ID: 24474812
is there any particular events that would show as web interactive logon/logoff tied with a particular user.  I am looking to recognize events for reporting.  to try to track the rww logon.
0
 
LVL 26

Expert Comment

by:DrDave242
ID: 24640224
Sorry, I went on vacation and forgot about this when I returned.  I don't know if an RWW-based logon would show up any differently from a normal network logon in the log.  You may have to test it to see.
0
 

Accepted Solution

by:
ee_auto earned 0 total points
ID: 26819208
Question PAQ'd, 500 points refunded, and stored in the solution database.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The SBS 2011 release date (RTM) is supposed to be around Christmas, 2011.  This article is a compilation of my notes -- things I have learned first hand.  The items are in a rather random order, but I think this list covers most of what is new and d…
I work for a company that primarily works with small businesses as their outsourced IT vendor. As such the majority of these customers utilize some version of Small Business Server. Due to the economics of running a small business, many of these cus…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses
Course of the Month13 days, 10 hours left to enroll

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question