Prove Application was Run on Windows Server

Posted on 2011-02-14
Last Modified: 2012-05-11
I have a situation where a person has mapped a drive and has run an application they were not suppose to. I know the Windows7 Desktop they were on and the time of the incident. I also The application that was run. The person has admitted that they have made a mistake. I want proof from the Windows system logs as proof that the incedent happened at the person said it did. How and what do I need to collect and collate to prove this?

Service is Windows 2003, Desktop is Windows7 it is an enterprise domain.
Question by:JeffSchaper
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 96

Expert Comment

by:Lee W, MVP
ID: 34894331
If you haven't enabled auditing, then there is nothing in the system log UNLESS the application ran SPECIFICALLY and intentionally writes to it.  Depending on the app, MAYBE it created settings in the user's profile.... but it really depends on the app.  

Author Comment

ID: 34911779
So I'm not able to see the person map the drive to the share manually? The person typed in the unc path to get to the share.
LVL 96

Expert Comment

by:Lee W, MVP
ID: 34911856
There may be MRU (most Recently used) lists in the registry, but if the user is no longer connected, I don't recall any way of knowing if they were via event logs.  And if auditing wasn't enabled on the server/application executable, then there is definitely no way to know that the user actually executed the program.  (Why did the user even have permission (NTFS Permissions) to access the file if he wasn't supposed to?
LVL 96

Accepted Solution

Lee W, MVP earned 250 total points
ID: 34912630
So the C grade is because I couldn't tell you how to do the impossible?

Author Comment

ID: 34912688
Sorry leew, the C Grade was in response to my satisfaction, not your expertise. I can tell you are a very intelligent person. If I could change the grade I would.

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question