Three ways to track Windows system logon Hours

Source: Internet
Author: User

In the local area network work environment, often has the computer to be secretly attacked by others, in order to look for the behind-the-scenes attack hand, we need to let the Windows system automatically remember the illegal attacker to log on the system the time, in order to look for the clues. In fact, there are a number of ways to track memory system logon hours, which is not a few of the methods provided below to help us feel free to see the exact time that an illegal attacker logged in to the system.

1, skillfully use the strategy, record last logon time

In the case of multiple people using the same computer, we often encounter the phenomenon that when we leave the computer temporarily, there are other users secretly use their account to log on to the system, to view their records of operations and other access traces. To find out who is secretly concerned about the privacy of their operations, we can use the Windows Vista System Group Policy settings to automatically track the time to display the last login system, and we can also see which account is secretly logged into the local computer system, The following is the concrete implementation step of the method

First, open the Windows Vista System "Start" menu, select the "Run" command, in the pop-up System Run dialog box, enter the "gpedit.msc" string command, click the "OK" button, enter the corresponding system of the Group Policy console window;

Second, select the Computer Configuration node option in the left pane of the Console window. Then select the Administrative Templates/Windows Components/Windows logon options project from the node below and locate the target Group Policy from the right display pane of the Windows logon options project "Display information about previous logons during user logon", and then double-click the Target Group Policy option to open the Options settings dialog shown in Figure 1;

Check that the started option in this dialog box is selected. If you find that it has not been selected, we just have to select it again, and then click OK to save the setup action, so that the local Windows Vista system has the ability to automatically record the last logon system time.

After completing the above setup operation, if an illegal attacker uses our account to log on to the computer while we are out of the computer, Windows Vista will automatically save the time and memory of the illegal attacker's login system, and the next time we turn on the computer to enter the password for the login system, The system screen will be the last time to log on the system, and we can also see the specific user account to perform the login operation, at this time we can based on these status information to find specific illegal attackers, to ensure that the computer system will not continue to attack the future.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.