Solved

Unexplained Event Logs on Member Servers

Posted on 2011-09-07
11
447 Views
Last Modified: 2012-05-12
Hi,

We are using Windows server 2003 domain controllers. We are having member servers which are running on Windows Server 2003.We are observed some events logged in our member servers with event id 540.

The users don't have any permission to login to the server but still some events are logging with those user id in event viewer.

Source: Security
Categeory: Logon/Logoff
EventID: 540
Type: Success A

Can any one suggest me why such types of events are logged in the event viewer. We need resolution for this.

Thanks in Advance.
0
Comment
Question by:gaddam01
  • 6
  • 5
11 Comments
 
LVL 20

Expert Comment

by:Lazarus
Comment Utility
Event 540 gets logged when a user elsewhere on the network connects to a resource (e.g. shared folder) provided by the Server service on this computer. The Logon Type will always be 3 or 8, both of which indicate a network logon.
0
 

Author Comment

by:gaddam01
Comment Utility
Hello,

Thanks for the response. You mean to say that the user is having some permissions any any shared folder on the server?

What is the meaning of Network Logon?

If the user don't have any logon rights on the server then in the event viewer why it is showing as Logon/Logoff?
0
 
LVL 20

Expert Comment

by:Lazarus
Comment Utility
Yes, if a member of the Active Directory is accessing resources on the server from there client computer it will log that on teh server, since they have accessed the server through the network.

Do you have Shared Folders on this server? A DFS folder etc...?
0
 

Author Comment

by:gaddam01
Comment Utility
We don't have any shared folders and DFS folders also.
0
 
LVL 20

Expert Comment

by:Lazarus
Comment Utility
Do you have any server resources availble to the network? is it an Active Directory Server? If so thats all it reall takes, if it is getting information from the server. It is not a real issue, but it should also be telling you who is accessing it. look at the details:

•User Name: %1
•Domain: %2
•Logon ID: %3
•Logon Type: %4
•Logon Process: %5
•Authentication Package: %6
•Workstation Name: %7

You can see from there what WKS is accessing the server and such.
0
Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

 

Author Comment

by:gaddam01
Comment Utility
I have attached the Event Viewer details for the issue. I need to stop these events from happening on the servers.

Even though the users don't have any access or permissions on the servers still it is happening. We don't have any shared or DFS folders on the servers.

This is very urgent, Please help me out on this. Event-viewr-details.doc
0
 
LVL 20

Expert Comment

by:Lazarus
Comment Utility
This is not a bad thing. It's normal:

For network connections (such as to a file server), it will appear that users log on and off many times a day. This phenomenon is caused by the way the Server service terminates idle connections.

If a user turns off his/her computer, Windows does not have an opportunity to log the logoff event until the system restarts. Therefore, some logoff events are logged much later than the time at which they actually occur.

ANONYMOUS LOGONs are routine events on Windows networks.
 
Microsoft's comments:
This event does not necessarily indicate the time that a user has stopped using a system. For example, if the computer is shut down or loses network connectivity it may not record a logoff event at all.
0
 

Author Comment

by:gaddam01
Comment Utility
Hello,

Thanks for the reply. In the reply you had mentioned Microsoft comments can you please send me any Microsoft KB Article which is supporting your comments.
0
 
LVL 20

Accepted Solution

by:
Lazarus earned 500 total points
Comment Utility
My apologise, but the Comments section was for Event 4638 which is closely related to what you are seeing, but not the same.

You can also use a GPO to diable anonymous login, but you may disable more than you are looking to if these are legitimate logons.
http://social.technet.microsoft.com/Forums/en-US/winserversecurity/thread/6d95e56a-dd0e-406e-b492-faa6e37fabee/

Look here for details on event 540: http://www.microsoft.com/technet/support/ee/transform.aspx?ProdName=Windows+Operating+System&ProdVer=5.0&EvtID=540&EvtSrc=Security&LCID=1033

then look here for a better understanding of it:http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=540

You can look here as well for some advice in Experts exchange on this: http://www.experts-exchange.com/Networking/Network_Management/Auditing_Software/Q_22413459.html
0
 

Author Comment

by:gaddam01
Comment Utility
3      Network      A user or computer logged on to this computer from the network.

From Microsoft KB Article it was written like the above one. What is the meaning of it?

User don't have any rights on the Member server then How can login to Member server from Network?
This is not clear to me.

Please send me your comments on this. Because we don't have shared any thing on this server.
0
 
LVL 20

Expert Comment

by:Lazarus
Comment Utility
He does not have to have login rights to it. His computer could be contacting it for many different reasons.
Perhaps it would help if you told me what the Server is, in conjunction to the network. Is it a DC? A file server SQL server etc. What is it's function?
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

I know all systems administrator at some time or another has had to create a script to copy file from a server share to a desktop. Well now there is an easy way to do this in Group Policy. Using Group policy preferences is not hard. The first thing …
On July 14th 2015, Windows Server 2003 will become End of Support, leaving hundreds of thousands of servers around the world that still run this 12 year old operating system vulnerable and potentially out of compliance in many organisations around t…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now