Solved

Printer Logs? Server 2003

Posted on 2011-02-18
3
295 Views
Last Modified: 2012-05-11
This almost no doubt not possible, but I thought I'd give it a whirl.  

Seems like someone in my organization printed out a jpeg (that was on a networked drive) to a networked printer, and apparently this was an offensive image.  Would there be anything in the windows log that would
a) Show an image being printed
b) the user that printed the image
0
Comment
Question by:JamesonJendreas
  • 2
3 Comments
 
LVL 70

Expert Comment

by:KCTS
ID: 34930882
If auditiing was enabled on the file/folder with the required level of logging then it just may be possible to see who accessed the file - in reality I doubt you have logging enabled at this level (the log would be huge), so sadly there is no way of determining this from the logs
0
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 34930935
Look in your server's system log for Source "Print" Event ID "10" - NOTE: this COULD take a while to sort through depending on how many users/printers/etc.
0
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 500 total points
ID: 34930943
The information you can expect to find is something like this:
<document/File name> owned by <username> was printed on <printerName> via port <portName>.  Size in bytes: <byte count>; pages printed: <pages>
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This may not be a text book method to resolve VSS backup issues but it seemed to have worked on few of the Windows 2003 servers we had issues while performing a Volume Shadow Copy backup. If you have issues while performing a shadow copy backup usin…
Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question