Solved

Last login for VPN access

Posted on 2014-04-06
2
1,006 Views
Last Modified: 2014-06-02
Hi guys,

We are currently trying to investigate if there is a way to determine last login access to our Active Directory via a VPN method.

We currently have several methods that our users can VPN in to our corporate network.

What we want to know is if there is a way to verify last login access via a universal way in our Active Directory or other means, which is separate from each VPN method?

In other words, irrespective of what VPN method they use to get connected to our corporate network, is there a way to check last logon to our Active Directory which maps back to/or updates an attribute in Active Directory to define when they last logged on to our Active Directory (via a VPN method)?

Any help greatly appreciated.
0
Comment
Question by:Simon336697
  • 2
2 Comments
 
LVL 1

Expert Comment

by:43t3R
Comment Utility
Since your VPN requires logging into the machine, you can always set up a script to monitor the VPN server's security (audit logon and failure - you can google the event ID #s) event logs.

if you use a VPN device then there should be a way to generate log files for this.

You should be able to find examples of these scripts all over the internet to accomplish different goals - powershell is a very good language for this.

depending on your needs, you might have to investigate third party network monitoring software. There are many of these - some of them open source.

browse sourceforge or google solar winds alternatives.
0
 
LVL 1

Accepted Solution

by:
43t3R earned 500 total points
Comment Utility
The domain controller will have logs also that monitors the whole domain and you can filter these in your script to only include the machines you want to monitor. Just re read your post.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

A quick step-by-step overview of installing and configuring Carbonite Server Backup.
In this article, we will see the basic design consideration while designing a Multi-tenant web application in a simple manner. Though, many frameworks are available in the market to develop a multi - tenant application, but do they provide data, cod…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now