Solved

How does one track VPN and Remote Desktop Users

Posted on 2010-08-17
3
967 Views
Last Modified: 2012-05-10
We have a Windows 2003 Server on a server with a number of different virtual machines.  I've had some recent concerns about when some of our users have been VPNing into the network and which machines have been Remote Desktopped into.  Can someone explain exactly which logs would contain the user name, date and time of VPN acccess and Remote Desktop use? Thanks.
0
Comment
Question by:tklingman
3 Comments
 
LVL 4

Accepted Solution

by:
ericnils earned 42 total points
ID: 33456501
The security log in Event Viewer records all authentication events with a user name and time stamp.  If you are using AD authentication you already have this logging centralized on the domain controller(s)
0
 
LVL 1

Assisted Solution

by:ShattyP
ShattyP earned 42 total points
ID: 33456533
Are you using Windows  IAS to handle authentication?  If so, open IAS and select 'Remote Access Logging.'  Tell it where you want it to store the logs and the name format for the log.  Such as E:\Logs.  Tell it to create a new log file everyday and select the boxes that tell it to log Accounting and Authentication requests.   These logs will give you the time, the username and the IP address of users connecting to your network.  
0
 
LVL 5

Assisted Solution

by:ploftin
ploftin earned 41 total points
ID: 33456548
What type of VPN are you referring to?  If it's a Microsoft routing and remote access setup, look in C:\Windows\Tracing for the RRAS logs.

As for Remote Desktop logging, look in the Event Log (Security) for a Logon/Logoff Event 528. It should have a Logon Type 10. The event log can be viewed by going to "Start -> Run -> eventvwr.exe".

You need to setup an Audit Policy using the Group Policy editor to log logon success and failures. Go
to "Start -> Run" and type 'gpedit.msc' (without the quotes). Navigate to "Local Computer Policy ->
Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Audit
Policies -> Audit logon events". Highlight and right-click and select properties. Configure as
desired.
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now