Tracking Administrator Logons

Learn about a reader-provided solution that includes a batch file to help automate the process of auditing systems for Administrator access and installing software on a 1500-client network.

Readers

January 16, 2001

2 Min Read
ITPro Today logo

My company doesn't give users Administrator access to their workstations. The local Administrator password is the same on all 1500 Windows NT Workstation systems in our domain, and we change the password every 30 days. We wanted to know when a user logged on to a workstation using the default Administrator account so that we could change the password immediately rather than allow 30 days of unauthorized access.

To let us know when a user logged on as Administrator, one option was to turn on auditing on all workstations to track successful and failed logon attempts, then use a third-party software package to monitor the logs and check for Administrator logons. However, this solution required the IT staff to manually turn on auditing and install the third-party agent on each of the 1500 workstations. In an attempt to automate this process, I used the following steps:

  1. I created the following userchk.cmd batch file:

    If %username%==Administrator goto loggoto end:lognow >> c:winntsystem32userchk.txtecho %computername% >> c:winntsystem32userchk.txt:end
  2. I used a homegrown software-distribution utility that uses Administrator rights during logon to add c:winntsystem32userchk.cmd to the HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun registry subkey.

  3. I copied the userchk.cmd file to the workstation's c:winntsystem32 directory during the user logon script.

  4. I modified the user logon script to look for c:winntsystem32userchk.txt. If this file is present, use the target \servershare%computername%.txt to copy it to a central server. (This step gives the file a unique name on the central server.)

This solution causes the system to run userchk.cmd each time a user logs on. If the current logon name is Administrator, the file echoes the time and computername to userchk.txt. The next time the machine runs the domain logon script, the system copies the userchk.txt to the central server where the IT staff can audit it. However, this solution doesn't work if users are a member of the local Administrator group and log on with their usual username.

—Stephen Scharf
[email protected]

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like