Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Stange devices appearing on the network

Posted on 2011-09-30
3
Medium Priority
?
229 Views
Last Modified: 2012-06-27
Hi Everyone,

I have an odd issue today that I need some help with. Attached is a screen shot showing some devices appearing in the network. There seem to be more and more added each day too.

 PC List
These devices do not appear to have been assigned an IP address or been registered in DNS.
I have asked the customer if they have plugged anything on the network which they do not think they have. I cannot ping any of these devices or open them in a web browser.

I would like to figure out where these are coming from but there is nothing in the event logs either.

Any ideas how I can track this down?

Thanks

Dave
0
Comment
Question by:TriumphLTD
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 36890806
Try to run in command-line on a DC or server/workstation with Administrative/RSAT Tools installed

dsquery * -filter "&(&(objectClass=Computer)(objectCategory=Computer)(name=eu8f48c4j))" -attr distinguishedName,whenCreated,whenChanged

and check if domain does know anything about this object (looks like computer object)? Maybe some SMS/SCCM/WDS-like software pre-populated computer account within domain ?

Regards,
Krzysztof
0
 

Accepted Solution

by:
TriumphLTD earned 0 total points
ID: 36915704
I have managed to find the issue here. We had a consultant in who was running a VPN connection to thier own network which contains 300,000 machines! Now they have stopped these have gone. Thanks for your help though.
0
 

Author Closing Comment

by:TriumphLTD
ID: 36941020
Correct solution
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

On July 14th 2015, Windows Server 2003 will become End of Support, leaving hundreds of thousands of servers around the world that still run this 12 year old operating system vulnerable and potentially out of compliance in many organisations around t…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question