Solved

Expected Security Event Logs of "Event type: 2" not present

Posted on 2011-09-13
5
268 Views
Last Modified: 2012-05-12
Hello all,

According to http://www.windowsecurity.com/articles/logon-types.html, I should see "Logon type:2" on the DC when a user logs in, but all I see are Type:3". There's no log filtering in place.

The Type:3 events do align with when a given user logs in, but there are more than a dozen such related events within a minute of an actual at-keyboard logon which makes the logs hard to parse.

I've made sure that the user is actually logging in and not just unlocking the computer.

Should I not see type:2 in the security logs?
0
Comment
Question by:nathanwc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Mike Kline
ID: 36529798
Type 2 events would be on their machines.  That is an interactive login.

Thanks

Mike
0
 
LVL 1

Accepted Solution

by:
nathanwc earned 0 total points
ID: 36529833
OK, so I checked the security event viewer on one of the desktops that's used everyday - there hasn't been a security entry logged on that machine since 2006.
0
 
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 500 total points
ID: 36530104
Not sure how you have auditing setup on the desktops.  I logged in interactively (keyboard) on my test DC.  See attached logon 2 event.

Thanks

Mike
logontype.jpg
0
 
LVL 1

Author Comment

by:nathanwc
ID: 36713096
OK, to abandon. Not worth pursuing.
0
 
LVL 1

Author Closing Comment

by:nathanwc
ID: 37517436
mklin71's answer probably was correct and complete, but I no longer needed to pursue. Thank you for the help, Mike!
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article outlines the process to identify and resolve account lockout in an Active Directory environment.
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question