Solved

Can I see who and when someone has logged onto a server or PC in the network

Posted on 2010-08-16
5
1,091 Views
Last Modified: 2013-12-04
hi all,

I have a new client who has a SBS2008 network, pretty straightforward setup, half a dozen workstations or so and remote access via Remote Web Workplace and RDP to the SBS box enabled.

the boss thinks that someone has accessed confidential information on the server from outside the network.  He suspects they have either connected to the server via RDP or another pc via RWW with his account or the administrator account and viewed documents in a shared folder on the server that are restricted to his logon and the admin logon.

He has asked me to find out what i can about any unauthorised remote access.   He wants to know if I can tell what IP addresses have accessed the server from outside (via RWW or RDP) or see what accounts have logged onto the server directly.  From what i know, there is very little logging enabled to be able to find out any of this information, is that correct?

nathan
0
Comment
Question by:natrat22
5 Comments
 
LVL 56

Accepted Solution

by:
Cliff Galiher earned 500 total points
ID: 33451458
The security event log will tell you some of the information you seek, but by default file access is not audited, so tryi8ng to find past accesses will simply not be possible. You can turn on auditing to catch future events, but it does come at a cost of system performance and HUGE log files, so ti should only be done on an as-needed basis. Basically if the boss things someone will do so again, you can turn on auditing for the select files s/he thinks will be accessed, and then turn it off again when you have completed the task.
But if s/he feels the damage has been done and just wants a historical view, if this was a default installation, it is simly too late. Not much will be discoverable.
-Cliff
 
0
 
LVL 6

Expert Comment

by:nettek0300
ID: 33451470
It depends on if someone set up logging or not.  All the logs you would need to see would be in the security section of the event viewer.  Depending on whether or not logging is turned on would depend on whether you would be able to see what you need.  You can set this up via group policy.  There are logs that are tagged as logon/logoff which is where you can see who logged on and off.  You just have to look carefully.  Another way to tell what computer is logging on is that typically when a computer connects via RDP, the server will try to setup the printers that are on the clients computer.  Delending on the OS version and print drivers, you can sometimes see errors in the system log where the printer setup failed.  It will list the computer device name in those logs.
0
 
LVL 9

Expert Comment

by:authen-tech
ID: 33451511
You may be able to access the event viewer (start/run/eventvwr) and go to the security tab.  It's a very basic log of who has successfully logged in and notes error's when people attempt to log in and provide the wrong password.  If you have an idea of when the alleged violation occurred, this might help.

Todd
0
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 33452123
If they came in through RWW, then there should be a record of it in the IIS Log files...
0
 
LVL 1

Author Closing Comment

by:natrat22
ID: 33526987
Thanks..
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now