Solved

trace login logout time via pc

Posted on 2010-09-21
7
907 Views
Last Modified: 2012-05-10
is there anyway to trace time sheet via pc.. login and logout time?
0
Comment
Question by:grnow
7 Comments
 
LVL 2

Assisted Solution

by:ntype
ntype earned 50 total points
ID: 33723535
The login and logout events are monitored into the event viewer (security). If you want to monitor 'only one' computer looking into the event log will give you the times.

Now if you want to monitor more than one computer you'll have to do it differentely. First you'll need to centralize the event reporting to a server. Some solutions like 'snare' will allow you to do a central sysloging.

Then from this point I suspect this may vary from the products you'll choose but you could either export the logs at a regular interval or create a data connection so you could work out some reporting from excel or crystal reports.
0
 
LVL 12

Assisted Solution

by:antony_kibble<!-8D58D5C365651885FB5A77A120C8C8C6-->
antony_kibble<!-8D58D5C365651885FB5A77A120C8C8C6--> earned 50 total points
ID: 33723629
The  Security log events you are looking for are 528 and 540 for login and 538 for a log off. You want to look for Logon type 2 as that is the interactive logon/off.
0
 
LVL 8

Expert Comment

by:jako
ID: 33734050
this is the kind of automation that I am wholeheartedly against. One of the reasons being tech savvy users having now incentive to hack some sort of autologin to work (and autologins are bad for so many reasons - console vulnerability, saved passwords etc).
essentially there are several ways to fool your logon/logoff tracing script to make it believe that user was present when in fact he/she wasn't

please reconsider this method of registering attendance for it is flawed (FUBAR)
0
Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

 

Accepted Solution

by:
grnow earned 0 total points
ID: 33828589
thanks for all the suggestions. think we go along with those software based applications to serve the purpose
0
 
LVL 8

Expert Comment

by:jako
ID: 33838164
of course there is no perfect answer because your project is being done under false pretenses.
the first two answers are actually great for the question asked if you know your scripting languages but since you need _a solution_ to your problem, you wouldn't see it that way.
this is why you need to elaborate and ask questions with more context. to short, exact questions you'll get short and concise answers (#33723629). please revise.
0
 
LVL 8

Expert Comment

by:jako
ID: 33888828
"... the question was going to be split for the following reason:
 no perfect answer.. look for alternative"
Id est the original poster was NOT pleased and rephrasing his closing statement would look like:
"I did not get what I wanted. I'm going to seek help elsewhere"

And my objection on that:
"... the first two answers are actually great for the question asked if you know your scripting languages but since you need _a solution_ to your problem, you wouldn't see it that way.
this is why you need to elaborate and ask questions with more context. to short, exact questions you'll get short and concise answers ..."
0

Featured Post

Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Join & Write a Comment

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now