Solved

trace login logout time via pc

Posted on 2010-09-21
7
912 Views
Last Modified: 2012-05-10
is there anyway to trace time sheet via pc.. login and logout time?
0
Comment
Question by:grnow
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 2

Assisted Solution

by:ntype
ntype earned 50 total points
ID: 33723535
The login and logout events are monitored into the event viewer (security). If you want to monitor 'only one' computer looking into the event log will give you the times.

Now if you want to monitor more than one computer you'll have to do it differentely. First you'll need to centralize the event reporting to a server. Some solutions like 'snare' will allow you to do a central sysloging.

Then from this point I suspect this may vary from the products you'll choose but you could either export the logs at a regular interval or create a data connection so you could work out some reporting from excel or crystal reports.
0
 
LVL 12

Assisted Solution

by:antony_kibble<!-8D58D5C365651885FB5A77A120C8C8C6-->
antony_kibble<!-8D58D5C365651885FB5A77A120C8C8C6--> earned 50 total points
ID: 33723629
The  Security log events you are looking for are 528 and 540 for login and 538 for a log off. You want to look for Logon type 2 as that is the interactive logon/off.
0
 
LVL 8

Expert Comment

by:jako
ID: 33734050
this is the kind of automation that I am wholeheartedly against. One of the reasons being tech savvy users having now incentive to hack some sort of autologin to work (and autologins are bad for so many reasons - console vulnerability, saved passwords etc).
essentially there are several ways to fool your logon/logoff tracing script to make it believe that user was present when in fact he/she wasn't

please reconsider this method of registering attendance for it is flawed (FUBAR)
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Accepted Solution

by:
grnow earned 0 total points
ID: 33828589
thanks for all the suggestions. think we go along with those software based applications to serve the purpose
0
 
LVL 8

Expert Comment

by:jako
ID: 33838164
of course there is no perfect answer because your project is being done under false pretenses.
the first two answers are actually great for the question asked if you know your scripting languages but since you need _a solution_ to your problem, you wouldn't see it that way.
this is why you need to elaborate and ask questions with more context. to short, exact questions you'll get short and concise answers (#33723629). please revise.
0
 
LVL 8

Expert Comment

by:jako
ID: 33888828
"... the question was going to be split for the following reason:
 no perfect answer.. look for alternative"
Id est the original poster was NOT pleased and rephrasing his closing statement would look like:
"I did not get what I wanted. I'm going to seek help elsewhere"

And my objection on that:
"... the first two answers are actually great for the question asked if you know your scripting languages but since you need _a solution_ to your problem, you wouldn't see it that way.
this is why you need to elaborate and ask questions with more context. to short, exact questions you'll get short and concise answers ..."
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question