Solved

Why would an employee export the security event log?

Posted on 2015-01-20
3
12 Views
Last Modified: 2016-06-23
Long story but an employee left today and they were mucking around on their computer before they left (mid working shift). We could see that via their email log that they exported their Security Event log just before they left the office. They apparently erased their Internet history.

I don't know why someone would be interested in the security log. They didn't wipe it from their computer either so we were able to go in and just look at it.

Now I don't use the security log really at all (so I don't know much about reading it) but it seems there's events in there (such as that below) that mention other users who have NEVER logged on to that PC.

Special privileges assigned to new logon.

Subject:
      Security ID:            S-1-5-21-21086547-2992122978-1601556566-1173
      Account Name:            Other.User
      Account Domain:            DOMAIN
      Logon ID:            0x1DC7139

Privileges:            SeSecurityPrivilege
                  SeBackupPrivilege
                  SeRestorePrivilege
                  SeTakeOwnershipPrivilege
                  SeDebugPrivilege
                  SeSystemEnvironmentPrivilege
                  SeLoadDriverPrivilege
                  SeImpersonatePrivilege


The other bizarre thing is that the user is able to right click the event viewer and 'connect to another computer'. It successfully connects to the SBS box and the SBS logs can be read. Is that normal? I've confirmed that the user is not apart of any domain administrators group.

Any clarification on this would be great.

Thanks
0
Comment
Question by:Talds_Alouds
3 Comments
 
LVL 53

Accepted Solution

by:
Will Szymkowski earned 500 total points
ID: 40562037
Security Logs on a local pc are pretty much useless. If they got the security logs from a domain controller this is another story. Even if they did get the security logs from a DC (if they had access) this there most they would be able to get out of them are usernames.

Passwords are not stored or transmitted in the security logs (they are stored in the SAM database) so I would not worry about this.

Will.
0
 

Author Comment

by:Talds_Alouds
ID: 40563135
Yeah I figured that was the case, it was just a bizarre thing to export and send to your private email address.

What about how he had the ability to connect to the server via mmc and view the DC logs? I've just logged in again as the user to make sure I wasn't seeing things and I can see all the server's event logs.

As well, why does the local security logs contain logs such as that in the OP that references 'other.user' where other.user has never logged on to that computer before...
0

Join & Write a Comment

Suggested Solutions

As network administrators; we know how hard it is to track user’s login/logout using security event log (BTW it is harder now in windows 2008 because user name is always “N/A” in the grid), and most of us either get 3rd party tools, or just make our…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now