Solved

Expected Security Event Logs of "Event type: 2" not present

Posted on 2011-09-13
5
269 Views
Last Modified: 2012-05-12
Hello all,

According to http://www.windowsecurity.com/articles/logon-types.html, I should see "Logon type:2" on the DC when a user logs in, but all I see are Type:3". There's no log filtering in place.

The Type:3 events do align with when a given user logs in, but there are more than a dozen such related events within a minute of an actual at-keyboard logon which makes the logs hard to parse.

I've made sure that the user is actually logging in and not just unlocking the computer.

Should I not see type:2 in the security logs?
0
Comment
Question by:nathanwc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Mike Kline
ID: 36529798
Type 2 events would be on their machines.  That is an interactive login.

Thanks

Mike
0
 
LVL 1

Accepted Solution

by:
nathanwc earned 0 total points
ID: 36529833
OK, so I checked the security event viewer on one of the desktops that's used everyday - there hasn't been a security entry logged on that machine since 2006.
0
 
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 500 total points
ID: 36530104
Not sure how you have auditing setup on the desktops.  I logged in interactively (keyboard) on my test DC.  See attached logon 2 event.

Thanks

Mike
logontype.jpg
0
 
LVL 1

Author Comment

by:nathanwc
ID: 36713096
OK, to abandon. Not worth pursuing.
0
 
LVL 1

Author Closing Comment

by:nathanwc
ID: 37517436
mklin71's answer probably was correct and complete, but I no longer needed to pursue. Thank you for the help, Mike!
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question