Automating Detection of Logon Failures In a Windows NT DomainLast reviewed: March 2, 1998Article ID: Q171148 |
The information in this article applies to:
SUMMARYDetecting log on failures or account lockouts in a Windows NT domain with multiple domain controllers and trusting domains may be difficult. To do this manually would require the administrator to load the security event log of multiple domain controllers and set the filter to find the log on failure events.
MORE INFORMATIONUse the Dumpel.exe utility from the Windows NT Resource Kit to enable the domain administrator to automate this procedure. By creating a simple batch file to query the security event log of all of your domain controllers, you can quickly automate the process. The log on failure events will only be recorded in the log of the primary domain controller (PDC) or backup domain controller (BDC) that authenticated the user. When you log on to a trusting domain from the trusted domain, the event may be recorded in the trusted domain, so you would need to query the event logs of both domains. To automate this procedure, perform the following steps:
|
Additional query words: hacker ntreskit log logins lockout
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |