Solved

Prove Application was Run on Windows Server

Posted on 2011-02-14
6
934 Views
Last Modified: 2012-05-11
I have a situation where a person has mapped a drive and has run an application they were not suppose to. I know the Windows7 Desktop they were on and the time of the incident. I also The application that was run. The person has admitted that they have made a mistake. I want proof from the Windows system logs as proof that the incedent happened at the person said it did. How and what do I need to collect and collate to prove this?

Service is Windows 2003, Desktop is Windows7 it is an enterprise domain.
0
Comment
Question by:JeffSchaper
  • 3
  • 2
6 Comments
 
LVL 95

Expert Comment

by:Lee W, MVP
Comment Utility
If you haven't enabled auditing, then there is nothing in the system log UNLESS the application ran SPECIFICALLY and intentionally writes to it.  Depending on the app, MAYBE it created settings in the user's profile.... but it really depends on the app.  
0
 
LVL 4

Author Comment

by:JeffSchaper
Comment Utility
So I'm not able to see the person map the drive to the share manually? The person typed in the unc path to get to the share.
0
 
LVL 95

Expert Comment

by:Lee W, MVP
Comment Utility
There may be MRU (most Recently used) lists in the registry, but if the user is no longer connected, I don't recall any way of knowing if they were via event logs.  And if auditing wasn't enabled on the server/application executable, then there is definitely no way to know that the user actually executed the program.  (Why did the user even have permission (NTFS Permissions) to access the file if he wasn't supposed to?
0
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 250 total points
Comment Utility
So the C grade is because I couldn't tell you how to do the impossible?
0
 
LVL 4

Author Comment

by:JeffSchaper
Comment Utility
Sorry leew, the C Grade was in response to my satisfaction, not your expertise. I can tell you are a very intelligent person. If I could change the grade I would.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now