Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Unexplained Event Logs on Member Servers

Posted on 2011-09-07
Medium Priority
Last Modified: 2012-05-12

We are using Windows server 2003 domain controllers. We are having member servers which are running on Windows Server 2003.We are observed some events logged in our member servers with event id 540.

The users don't have any permission to login to the server but still some events are logging with those user id in event viewer.

Source: Security
Categeory: Logon/Logoff
EventID: 540
Type: Success A

Can any one suggest me why such types of events are logged in the event viewer. We need resolution for this.

Thanks in Advance.
Question by:gaddam01
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 5
LVL 20

Expert Comment

ID: 36497613
Event 540 gets logged when a user elsewhere on the network connects to a resource (e.g. shared folder) provided by the Server service on this computer. The Logon Type will always be 3 or 8, both of which indicate a network logon.

Author Comment

ID: 36497666

Thanks for the response. You mean to say that the user is having some permissions any any shared folder on the server?

What is the meaning of Network Logon?

If the user don't have any logon rights on the server then in the event viewer why it is showing as Logon/Logoff?
LVL 20

Expert Comment

ID: 36497746
Yes, if a member of the Active Directory is accessing resources on the server from there client computer it will log that on teh server, since they have accessed the server through the network.

Do you have Shared Folders on this server? A DFS folder etc...?

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.


Author Comment

ID: 36497865
We don't have any shared folders and DFS folders also.
LVL 20

Expert Comment

ID: 36497944
Do you have any server resources availble to the network? is it an Active Directory Server? If so thats all it reall takes, if it is getting information from the server. It is not a real issue, but it should also be telling you who is accessing it. look at the details:

•User Name: %1
•Domain: %2
•Logon ID: %3
•Logon Type: %4
•Logon Process: %5
•Authentication Package: %6
•Workstation Name: %7

You can see from there what WKS is accessing the server and such.

Author Comment

ID: 36574741
I have attached the Event Viewer details for the issue. I need to stop these events from happening on the servers.

Even though the users don't have any access or permissions on the servers still it is happening. We don't have any shared or DFS folders on the servers.

This is very urgent, Please help me out on this. Event-viewr-details.doc
LVL 20

Expert Comment

ID: 36575437
This is not a bad thing. It's normal:

For network connections (such as to a file server), it will appear that users log on and off many times a day. This phenomenon is caused by the way the Server service terminates idle connections.

If a user turns off his/her computer, Windows does not have an opportunity to log the logoff event until the system restarts. Therefore, some logoff events are logged much later than the time at which they actually occur.

ANONYMOUS LOGONs are routine events on Windows networks.
Microsoft's comments:
This event does not necessarily indicate the time that a user has stopped using a system. For example, if the computer is shut down or loses network connectivity it may not record a logoff event at all.

Author Comment

ID: 36579813

Thanks for the reply. In the reply you had mentioned Microsoft comments can you please send me any Microsoft KB Article which is supporting your comments.
LVL 20

Accepted Solution

Lazarus earned 2000 total points
ID: 36581530
My apologise, but the Comments section was for Event 4638 which is closely related to what you are seeing, but not the same.

You can also use a GPO to diable anonymous login, but you may disable more than you are looking to if these are legitimate logons.

Look here for details on event 540: http://www.microsoft.com/technet/support/ee/transform.aspx?ProdName=Windows+Operating+System&ProdVer=5.0&EvtID=540&EvtSrc=Security&LCID=1033

then look here for a better understanding of it:http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=540

You can look here as well for some advice in Experts exchange on this: http://www.experts-exchange.com/Networking/Network_Management/Auditing_Software/Q_22413459.html

Author Comment

ID: 36583116
3      Network      A user or computer logged on to this computer from the network.

From Microsoft KB Article it was written like the above one. What is the meaning of it?

User don't have any rights on the Member server then How can login to Member server from Network?
This is not clear to me.

Please send me your comments on this. Because we don't have shared any thing on this server.
LVL 20

Expert Comment

ID: 36584135
He does not have to have login rights to it. His computer could be contacting it for many different reasons.
Perhaps it would help if you told me what the Server is, in conjunction to the network. Is it a DC? A file server SQL server etc. What is it's function?

Featured Post

 [eBook] Windows Nano Server

Download this FREE eBook and learn all you need to get started with Windows Nano Server, including deployment options, remote management
and troubleshooting tips and tricks

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question