Why would an employee export the security event log?

Posted on 2015-01-20
Medium Priority
Last Modified: 2016-06-23
Long story but an employee left today and they were mucking around on their computer before they left (mid working shift). We could see that via their email log that they exported their Security Event log just before they left the office. They apparently erased their Internet history.

I don't know why someone would be interested in the security log. They didn't wipe it from their computer either so we were able to go in and just look at it.

Now I don't use the security log really at all (so I don't know much about reading it) but it seems there's events in there (such as that below) that mention other users who have NEVER logged on to that PC.

Special privileges assigned to new logon.

      Security ID:            S-1-5-21-21086547-2992122978-1601556566-1173
      Account Name:            Other.User
      Account Domain:            DOMAIN
      Logon ID:            0x1DC7139

Privileges:            SeSecurityPrivilege

The other bizarre thing is that the user is able to right click the event viewer and 'connect to another computer'. It successfully connects to the SBS box and the SBS logs can be read. Is that normal? I've confirmed that the user is not apart of any domain administrators group.

Any clarification on this would be great.

Question by:Talds_Alouds
LVL 53

Accepted Solution

Will Szymkowski earned 2000 total points
ID: 40562037
Security Logs on a local pc are pretty much useless. If they got the security logs from a domain controller this is another story. Even if they did get the security logs from a DC (if they had access) this there most they would be able to get out of them are usernames.

Passwords are not stored or transmitted in the security logs (they are stored in the SAM database) so I would not worry about this.


Author Comment

ID: 40563135
Yeah I figured that was the case, it was just a bizarre thing to export and send to your private email address.

What about how he had the ability to connect to the server via mmc and view the DC logs? I've just logged in again as the user to make sure I wasn't seeing things and I can see all the server's event logs.

As well, why does the local security logs contain logs such as that in the OP that references 'other.user' where other.user has never logged on to that computer before...

Featured Post

Easily manage email signatures in Office 365

Managing email signatures in Office 365 can be a challenging task if you don't have the right tool. CodeTwo Email Signatures for Office 365 will help you implement a unified email signature look, no matter what email client is used by users. Test it for free!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question