473,387 Members | 1,344 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

User log files over a network

Reletively new to this, I wanted to know how feasable it is to create user log files for users over a network.

Each time somebody logs in, I would like the log file to display information such as time of log in, machine logged into and the software installed on the machine.

Is this do-able with all tools already available (i.e. dont have to install specialist software)?

Users are logging onto a network controlled by windows server 2003
Oct 29 '07 #1
2 1956
sicarie
4,677 Expert Mod 4TB
Reletively new to this, I wanted to know how feasable it is to create user log files for users over a network.

Each time somebody logs in, I would like the log file to display information such as time of log in, machine logged into and the software installed on the machine.

Is this do-able with all tools already available (i.e. dont have to install specialist software)?

Users are logging onto a network controlled by windows server 2003
I'm guessing you're speaking of someone logging into the domain. I'm not sure what your setup is (or what the default is anymore, it's been a few years), but I would recommend looking at the logs on the DC. (Right-click My Computer, Click Manage, and go to Event Viewer. Those should show your logs.)

There are ways to change the logging levels through Start, Control Panel, Administrative Tools, Local Security Policy, Local Policies. I'm pretty sure that will catch the logons to the domain (by altering the 'Audit Logon Events' in the Audit policy), but as this is a Win2k3 question, I'm going to move it over to the Windows Forum where our knowledgeable Windows members will probably be better able to either correct me, or give even more information in the rare event that I'm right. (The Windows Forum admins can move it back if it comes out that this is a syslog question or something of the sort.)

Best of luck
Oct 29 '07 #2
bartonc
6,596 Expert 4TB
There are ways to change the logging levels through Start, Control Panel, Administrative Tools, Local Security Policy, Local Policies. I'm pretty sure that will catch the logons to the domain (by altering the 'Audit Logon Events' in the Audit policy), but as this is a Win2k3 question, I'm going to move it over to the Windows Forum where our knowledgeable Windows members will probably be better able to either correct me, or give even more information in the rare event that I'm right.
That's exactly what I would have suggested (although I'm no W2K3 expert, that's right for on XP Pro).
Oct 29 '07 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: William | last post by:
I have this ASP.NET script that i use for creating tables of files in a folder for users. The problem is that if the user changes the username to create the list of files for, they can see the...
2
by: Christopher Jedlicka | last post by:
I am trying to write a script that will access files on another computer on the network but in a seperate domain. In order to access the files, I need to first authenticate to the other domain as...
8
by: Michelle | last post by:
Hello! I have an ASP.NET application (1.1 framework) that needs to be able to read/write files on a network share. The access to this file share will be fairly restricted, so I need to...
11
by: Marcelo López | last post by:
I need to create a folder in the file system owned by an special user created by my application. The idea is that only my app will have permissions to delete and create files on that folder. My...
8
by: Pete Wittig | last post by:
Hello, I am wondering if it is possible to create a networked application with C# that is seen as a windows user. For example, if Bob logged onto windows and then started the application, any...
4
by: James | last post by:
I have a VB windows forms application that accesses a Microsoft Access database that has been secured using user-level security. The application is being deployed using No-Touch deployment. The...
1
by: SteveM | last post by:
I am writing a ToolUsage tracker which we will be accessing from each of our custom written tools. It will basically capture various pieces of information about the user, and the application they...
2
by: IronMike | last post by:
I'm writing a program that needs to write files to a network share. My problem is that the program users are working on PCs that are not connected to our domain and the program needs to save files to...
20
by: =?Utf-8?B?QnJpYW4gTmljaG9sc29u?= | last post by:
Hello, I'm trying to create an admin page that can run miscellaneous scripts for our IT department. Currently, I'm trying to create a script that can map a network drive for a user (e.g. a form...
4
Chrisjc
by: Chrisjc | last post by:
Good evening, I was wondering if anyone knew of a way or something to help me out with an issue I been dealing with lately, I have several sites in an Active Directory environment across a WAN....
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.