Solved

Expected Security Event Logs of "Event type: 2" not present

Posted on 2011-09-13
5
271 Views
Last Modified: 2012-05-12
Hello all,

According to http://www.windowsecurity.com/articles/logon-types.html, I should see "Logon type:2" on the DC when a user logs in, but all I see are Type:3". There's no log filtering in place.

The Type:3 events do align with when a given user logs in, but there are more than a dozen such related events within a minute of an actual at-keyboard logon which makes the logs hard to parse.

I've made sure that the user is actually logging in and not just unlocking the computer.

Should I not see type:2 in the security logs?
0
Comment
Question by:nathanwc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Mike Kline
ID: 36529798
Type 2 events would be on their machines.  That is an interactive login.

Thanks

Mike
0
 
LVL 1

Accepted Solution

by:
nathanwc earned 0 total points
ID: 36529833
OK, so I checked the security event viewer on one of the desktops that's used everyday - there hasn't been a security entry logged on that machine since 2006.
0
 
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 500 total points
ID: 36530104
Not sure how you have auditing setup on the desktops.  I logged in interactively (keyboard) on my test DC.  See attached logon 2 event.

Thanks

Mike
logontype.jpg
0
 
LVL 1

Author Comment

by:nathanwc
ID: 36713096
OK, to abandon. Not worth pursuing.
0
 
LVL 1

Author Closing Comment

by:nathanwc
ID: 37517436
mklin71's answer probably was correct and complete, but I no longer needed to pursue. Thank you for the help, Mike!
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question