Delegating SELF (Computer) to track logins
By Steve Bowman
Published February 1, 2016
Estimated Reading Time: 2 minutes

Last time we were talking about tracking Users and allowing updating of users attributes with what computers they were using. This time we will be looking at computers and track logins. We will be using a GPO and a login script to track logins and capture computer information, and then allow the computer object to update the following attributes. EmployeeType, Company, Department, Title, TelephoneNumber, EmployeeNumber, Division, SN, GivenName, TelephoneAssistant, Assistant, and IPAddress.

Using the Delegation Wizard to configure Self the ability to update Computer objects attributes above.

delegation-self      delegation2-self

The script gathers the following information via WMI and updates the computer objects attributes with the following information.

slastuser, slasttime,  biosbrand,  compmodel,  biosver,  biosservicetag,  compcpu,  compram,  compsystemtype,  CompdomainroleRole,  strlastboot,compOSInstall, and strIPAddress.

delegation3-self

The script maps the WMI information to the following AD Computer attributes.

EmployeeType = slastuser & ” on ” & slasttime
Company = biosbrand
Department = compmodel
Title = biosver
TelephoneNumber = biosservicetag
EmployeeNumber = compcpu
Division = compram
SN = compsystemtype
GivenName = CompdomainroleRole
TelephoneAssistant = strlastboot
Assistant = compOSInstall
textEncodedORAddress = strIPAddress

 

CompADUpdate

Come back next time when we use a HTA to do some reporting on the Who, What, and Where.

 

Article By Steve Bowman
Steve Bowman is a Partner at Model Technology as well as their Vice President of Sales and Marketing. Steve is a father, husband, Franciscan, and lover of technology. He's bilingual in business and technology and have over 30 years of experience in selling enterprise technology solutions in a variety of industries.

Related Posts

Paying high cyber-insurance premiums?

Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.

Learn More