Navigation:  Web Reports > Compliance Tracking > Logon Tracking >

Network Logons

Top  Previous  Next

If you configured Network Logon Tracking then you can run queries to search for various network logon events on one of the following pages in the Compliance -> Logons section:

 

Network Logons
Logon Failures
Logon By Type

 

Common fields for all network tracking pages

 

# (Event Number)

The event number of the windows event that was logged by the OS to indicate the account change. You can click on the event number to display this event, assuming that a corresponding filter has been setup to capture these events.

 

Computer

This is the computer to which was logged on to. A computer in this field is always a domain controller.

 

Source Computer

The source computer is the computer from which the logon originated. This can be any computer.

 

Domain, Username

The user account who logged on.

 

Network Logons

 

Email

The username in user@domain form, when available.

 

Authentication Type

The authentication type, usually either Kerberos, Kerberos TGT or NTLM.

 

Protocol

The protocol used for the logon, usually either Kerberos or NTLM.

 

Logon Failures

 

Protocol

The protocol used for the logon, usually either Kerberos or NTLM.

 

Failure Reason

The reason why the logon failed. This information is localized and will be printed in the language of the OS.

 

Authentication Type

The authentication type, usually either NTLM Logon, Pre-Authentication Failure or Authentication Ticket Request.

 

Logon By Type

 

Logon Type

The logon type, e.g. Batch, Service or Interactive.

 

Logon Process

The logon process, e.g. User32, IIS or IAS.

 

Success / Failure

Displays "Success" for successful logons, and the failure reason for failed logons.