I've been asked to provide reports for a series of users outlining when they logged on/off the network. I've filtered the security log on the DC but I think I need to refine the results more. The security logs show events for the users in clumps of 3-6 every 10 minutes or so. I think alot of this is noise. Is there a way to further refine my results to just logging on/off the network?
What about querying the lastlogontimestamp and lastlogoff attributes in Active Directory.
Have a look at:
If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.
While rebooting windows server 2003 server , it's showing "active directory rebuilding indices please wait" at startup. It took a little while for this process to complete and once we logged on not all the services were started so another reboot is …
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email
Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…