Right now, not trying to deny. Just trying to find out what is going on so 
we can run a report for audit. Going to try and do a Logon Type = 2 or 10 
and see what I get.


Christopher Bodnar 
Enterprise Achitect I, Corporate Office of Technology:Enterprise 
Architecture and Engineering Services 
Tel 610-807-6459 
3900 Burgess Place, Bethlehem, PA 18017 
christopher_bod...@glic.com 




The Guardian Life Insurance Company of America

www.guardianlife.com 







From:   "Ziots, Edward" <ezi...@lifespan.org>
To:     "NT System Admin Issues" <ntsysadmin@lyris.sunbelt-software.com>
Date:   06/28/2012 12:44 PM
Subject:        RE: Identifying service accounts that are loggin in 
interactively



Why not put the service accounts in a group and apply GPO that denies 
logon type 2 (Logon Locally) via User Rights Assignment. 
 
1)       The common logon types are the following. 
a)       Logon Type (2): Console logon – interactive from the computer 
console
b)       Logon Type (3): Network logon – network mapping (net use/net 
view)
c)       Logon Type (4): Batch logon – scheduler
d)       Logon Type (5): Service logon – service uses an account
e)       Logon Type (6): Proxy Logon
f)        Logon Type (7): Unlock Workstation
g)       Logon Type (8): NetworkClearText ( Reserved for cleartext Logons 
over the network)
h)       Logon Type (9): NewCredentials (Initated by using runas command 
with the /netonly )
i)         Logon Type (10): Remote Interactive (Recorded for Terminal 
Service Logons) 
j)        Logon Type (11): Cached Interactive (Recorded when cached 
credentials are used to logon locally to a computer) 
k)       Logon Type (13): CachedUnlock (Recorded when the computer was 
unlocked and the user’s credentials were verified against previously 
cached credentials.) 
 
Z
 
 
 
Edward Ziots
CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org
 
From: Christopher Bodnar [mailto:christopher_bod...@glic.com] 
Sent: Thursday, June 28, 2012 10:37 AM
To: NT System Admin Issues
Subject: Identifying service accounts that are loggin in interactively
 
Is anyone else tasked with doing this? This is a new requirement from 
audit. We have about 1,000 accounts that are being used to run services in 
the environment. So audit is asking how we know these accounts aren't 
being used to logon interactively. All security logs are being shipped to 
or SEIM system. The question is how to identify this. My thought it that 
it would have to be an event from the member servers security log with an 
event ID of 528 where the logon type is not 5. Environment is FFL 2003. 

Initially I thought we would be able to distinguish this from just the 
domain controllers security logs. but that does not seem to be the case. 
Just looking at the domain controller logs, there doesn't seem to be any 
differentiation between the logon type, that is captured at the machine 
they are logging on from. 



If anyone has recommendations on how to do this differently or if they see 
a problem I'm missing, let me know. 

Thanks 

Christopher Bodnar 
Enterprise Achitect I, Corporate Office of Technology:Enterprise 
Architecture and Engineering Services 
Tel 610-807-6459 
3900 Burgess Place, Bethlehem, PA 18017 
christopher_bod...@glic.com 


The Guardian Life Insurance Company of America

www.guardianlife.com 


----------------------------------------- This message, and any 
attachments to it, may contain information that is privileged, 
confidential, and exempt from disclosure under applicable law. If the 
reader of this message is not the intended recipient, you are notified 
that any use, dissemination, distribution, copying, or communication of 
this message is strictly prohibited. If you have received this message in 
error, please notify the sender immediately by return e-mail and delete 
the message and any attachments. Thank you. 
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

<<image/jpeg>>

<<image/jpeg>>

Reply via email to