Solved

Windodws 7

Posted on 2015-01-20
6
50 Views
Last Modified: 2015-02-18
How can I audit what IP's are remotely logging in to the computer?  Also, is it available to track both ip and user name?
0
Comment
Question by:Jack_son_
6 Comments
 
LVL 90

Expert Comment

by:John Hurst
ID: 40559632
You cannot log onto a computer without a user name and password. Knowing the IP of a computer does not permit log on.

What is happening to you?  

If you are looking for web traffic talking to your computer, you can run Wire Shark or Comm View (tamsoft.com) to see what packets are going in and out. You can track this traffic by IP address.
0
 
LVL 9

Expert Comment

by:dlb6597
ID: 40559657
first confirm auditing is enabled. run secpol.msc, expand Local Policies, Audit Policy. Make sure the security setting is at minimum set to Success (it is also good to audit Failures).

Then in the security event log you will see the  logon events. Event id 528 will signify local (logon Type 2) or terminal services (logon type 10) logons, event id 540 will indicate network logons (to shares, etc.)

event id's 529 through 539  signify various types of logon failures..Event 538 will signify a user logoff.


event ID's
0
 
LVL 4

Accepted Solution

by:
MarcusSjogren earned 500 total points
ID: 40559660
Hi,

I don't have Windows 7 available for testing, but if you have the professional or enterprise version you can see it in the event log -> Windows Logs -> Security. Task Category = Logon

I have attached a screenshot, it was done on Server 2012 R2 since I did not have Windows 7 available, but it should be similar as I remember.

This is not a super-simple-solution, and there is no easier solution either.

I dont think there is any way of doing this if you are using WIndows 7 Home or similar versions.
Windows-Logon.png
0
 
LVL 59

Expert Comment

by:LeeTutor
ID: 40617840
I've requested that this question be deleted for the following reason:

Not enough information to confirm an answer.
0
 

Author Closing Comment

by:Jack_son_
ID: 40617841
This worked for me - thanks
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This Micro Tutorial will teach you how to the overview of Microsoft Security Essentials. This is a free anti-virus software that guards your PC against viruses, spyware, worms, and other malicious software. This will be demonstrated using Windows…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now