Or run "psloggedon" against it and see what user account is logged into
it. ;) 

-----Original Message-----
From: Sam Cayze [mailto:sam.ca...@rollouts.com] 
Sent: Tuesday, March 31, 2009 11:18 AM
To: NT System Admin Issues
Subject: RE: locating one machine

You guys are cruel!   :)

But it's fun listening to the ideas...


 

-----Original Message-----
From: John Cook [mailto:john.c...@pfsf.org] 
Sent: Tuesday, March 31, 2009 9:33 AM
To: NT System Admin Issues
Subject: RE: locating one machine

Shutdown \\computername /l  then wait for the call - if no call, repeat
until angry user calls

John W. Cook
Systems Administrator
Partnership For Strong Families
315 SE 2nd Ave
Gainesville, Fl 32601
Office (352) 393-2741 x320
Cell     (352) 215-6944
Fax     (352) 393-2746
MCSE, MCTS, MCP+I,CompTIA A+, N+


-----Original Message-----
From: Terry Dickson [mailto:te...@treasurer.state.ks.us]
Sent: Tuesday, March 31, 2009 9:24 AM
To: NT System Admin Issues
Subject: RE: locating one machine

I would go into my firewall and stop all external traffic, then just set
back and see who calls.  Usually if I cut them off from the Internet
they tend to call pretty quickly.



-----Original Message-----
From: John Aldrich [mailto:jaldr...@blueridgecarpet.com]
Sent: Tuesday, March 31, 2009 8:15 AM
To: NT System Admin Issues
Subject: locating one machine

I need to find a single machine that E-Eye's Conficker scanner says is
vulnerable. I know the IP address and I know the name, but I don't know
where this workstation is located. Any suggestions?



John-AldrichTile-Tools









~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

CONFIDENTIALITY STATEMENT: The information transmitted, or contained or
attached to or with this Notice is intended only for the person or
entity to which it is addressed and may contain Protected Health
Information (PHI), confidential and/or privileged material. Any review,
transmission, dissemination, or other use of, and taking any action in
reliance upon this information by persons or entities other than the
intended recipient without the express written consent of the sender are
prohibited. This information may be protected by the Health Insurance
Portability and Accountability Act of 1996 (HIPAA), and other Federal
and Florida laws. Improper or unauthorized use or disclosure of this
information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you
really need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to