![]() Where tblAssets. So far the Last logon - 64915 This website uses cookies. Inner Join tblCPlogoninfo On tblAssets.AssetID = tblCPlogoninfo.AssetID Solved: I tried creating a basic report that gives us the Azure AD users and the last logon date of that user in AAD. All the configured domain controllers are scanned for the last logon time. Select Top 1000000 tblCPlogoninfo.Username, AD users who logged in recently are determined based on their last logon / login time. Select Top 1000000 tblAssets.AssetID, tblAssets.AssetName, tsysAssetTypes.AssetTypename, tsysAssetTypes.AssetTypeIcon10 As icon, tblAssets.IPAddress, tblAssets.Lastseen, tblAssets.Lasttried, Max(tblCPlogoninfo. ![]() Here is the report as it is currently written: Select Distinct Top 1000000 tblAssets.AssetID, tblAssets. Run the report below and replace 30 with any time frame you would like to report on. If that's not possible, is there a way to create a report that will show when the last logon user was different from the previous. I know that in the Event Log, we can see events for logins relating to Disconnected sessions, so I have to assume this information is already collected by LanSweeper, if I knew how to find it. To get all the logon information from a single asset, you can run the following report after replacing the highlighted text with your asset's name. Is there a way to create a report to show if the last logon doesn't match the account that was manually associated to an AD user account The feature I am referring to is found under 'Edit User' -> 'Asset Relations'. Reports are always shared as an SQL query, you can find an explanation on how to add the SQL queries to your installation here: In that case you will have to use a report for both. Spiceworks is arguably one of the best places on the internet to hang out with your peers and colleagues, but we're interested to know where else you go, especially when you want to talk shop or keep up-to-date with the latest tech news, trends, and quest.You're right, I forgot about the page limitation. Leverage data and insights where needed most: auto-populate your CMDB, improve your IT Service Management, enrich security incident alerts, strengthen your Attack Surface Management, and so on.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |