Solved

Which user logged on at particular time?

Posted on 2014-01-29
7
370 Views
Last Modified: 2014-02-03
Is there a way to findout which user logged on at particular time like (jan28 2.10am).?
If yes, is there a way to findout which application that user accessed on the server?
0
Comment
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 19

Expert Comment

by:strivoli
ID: 39817325
The Windows Security Log (run eventvwr) on the server or on the AD DC will list when users logged in.
That depends on the application and if it isn't provided by the application you can set an Audit on the executable or on the folder "hosting" the executable.
0
 
LVL 9

Author Comment

by:Vijaya Reddy Pinnapa Reddy
ID: 39817329
Yes, security log, there is an event id i.e 4624. It contains
New Logon:
      Security ID:            domain\xxx$
      Account Name:            xxx$
      Account Domain:            domain
      Logon ID:            0x3xxxxx
      Logon GUID:            {d6b890ca-2b2b-afb0-e306-bbe9b5699fe3}
0
 
LVL 19

Expert Comment

by:strivoli
ID: 39817344
Fine. Set the Audit on the executable and make some tests and you'll see entries in the Security Log as well.
0
Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

 

Expert Comment

by:cloudvdiexpert1
ID: 39817375
By default the level of logging does not tell you much so you may have to increase that in the GPO for that server.

Unfortunately you will not get the answer i think you are seeking as, i know because i have been there, but you will be able to provide an approximate answer to the powers that be.
0
 
LVL 4

Expert Comment

by:michaelalphi
ID: 39820160
You can enable auditing on the domain level by using Group Policy to check user activity in particular time period :
Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy

Create a logon script on the required domain/OU/user account with the following content :
 
echo %date%,%time%,%computername%,%username%,%sessionname%,%logonserver% >> \\SERVER\SHARENAME$\LOGON.LOG

Create a logoff script on the required domain/OU/user account with the following content:
 
echo %date%,%time%,%computername%,%username%,%sessionname%,%logonserver% >> \\SERVER\SHARENAME$\LOGOFF.LOG
You can get more help at : http://support.microsoft.com/kb/556015
Also, you can check this automated option for the same : http://www.windowseventlogmonitor.com/
0
 
LVL 9

Accepted Solution

by:
Vijaya Reddy Pinnapa Reddy earned 0 total points
ID: 39820294
As i told i already enabled it. I checked by looking at the event 4624.

Thanks for your support
0
 
LVL 9

Author Closing Comment

by:Vijaya Reddy Pinnapa Reddy
ID: 39829106
As i told i already enabled it. I checked by looking at the event 4624.

Thanks for your support
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Here's a look at newsworthy articles and community happenings during the last month.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question