What Are Specific Secnariors That Updated A Computers LastLogonTimeStamp

I want to find out what specifically updates the lastlogontimestamp for computers. I have read the other articles that are referenced numerous times, but they do not have the exact answer to these questions (there are wonderful and have lots of information, but not the information I need). Which of these scenarios does the lastlogontimestamp get updated for a computer (given the 14 days minus a random percentage of 5 days has passed and that number is greater than the current lastlogontimestamp):

 

When a domain computer is restarted and stays connected to the network does this update the lastlogontimestamp?

From my testing I can confirm that the reboot update the lastlogon, but no idea about lastlogontimestamp

 

When a domain computer is logged onto with a domain account by logging on locally?

From my testing this did not update the lastlogon and I have no idea about lastlogontimestamp

 

When a domain computer is logged onto with a domain account by logging on remotely using Windows Remote Desktop Connection?

From my testing this did not update the lastlogon and I have no idea about lastlogontimestamp

 

When a domain computer is logged onto with a local account by logging on locally?

From my testing this did not update the lastlogon and I have no idea about lastlogontimestamp

 

 

Are there SPECIFIC events that would cause the lastlogontimestamp to be updated? I need to tell our administrators this information so they have an understanding on what Microsoft considers a stale account

June 7th, 2013 7:14pm

HI,

 can you please post me error that you get..like information event id for the same ?

Free Windows Admin Tool Kit Click here and download it now
June 7th, 2013 7:55pm

Once the computer authenticate to AD, that includes when the computer boots/starts as it auth with AD, and when the current kerberos ticket expire 10h (http://msdn.microsoft.com/en-us/library/ff649429.aspx) and when the password for the secure channel is changed.
June 7th, 2013 10:40pm

Hi,

In addition to others, please check this blog:

The LastLogonTimeStamp Attribute What it was designed for and how it works

http://blogs.technet.com/b/askds/archive/2009/04/15/the-lastlogontimestamp-attribute-what-it-was-designed-for-and-how-it-works.aspx

Regards.

If you have any feedback on our support, please click here

June 10th, 2013 10:41am

So what do you mean by authenticate to Active Directory? Are referring to requesting/renewing Kerberos tickets?

Here is info I was able to get based on the info you provided me:

Network logons are performed by computers when rebooting, requesting or renewing Kerberos tickets, establishing connections to a DC or other computer in system context etc... I hope that helps.

http://blogs.technet.com/b/askds/archive/2009/04/15/the-lastlogontimestamp-attribute-what-it-was-designed-for-and-how-it-works.aspx?PageIndex=2



Each computer joined to the domain will request a password change after a set number of days. The number of days was 30 in Windows 2000 and XP, and I believe it may still be 30 days. 

http://social.technet.microsoft.com/Forums/en-US/winserverDS/thread/10fc78d3-9aa8-4f6f-be30-a30fd5b87ec6



At some defined point, by default every 30 days or other specified time frame (reg key = HKLM\SYSTEM\CurrentControlSet\Services\NetLogon\Parameters reg value = MaximumPasswordAge) or when an admin forces a password change (nltest /sc_change_pwd:domain) a computer will attempt to change its domain password.

http://blog.joeware.net/2012/09/12/2590/

Free Windows Admin Tool Kit Click here and download it now
June 12th, 2013 8:17am

The
LastLogon attribute determines the most recent logon of user or computer account, this attribute is unique on each domain controller, it is updated only on the DC that validates the logon request and is not replicated to other domain controllers. The LastLogonTimeStamp attribute is replicated so all DCs have the same value for the attribute. The lastLogonTimeStamp attribute is not updated with all logon types or at every logon, only interactive, network and service logon updates the attribute. The
lastLogontimeStamp attribute is not updated every time a user or computer logs on to the domain, when to update the LastLogonTimeStamp depends on the ms-DS-Logon-Time-Sync-Interval attribute which is an attribute of the domain partition, the default value is 14 days.


The LastLogonTimeStamp is based on the value that the current date minus the value of the ms-DS-Logon-Time-Sync-Interval attribute minus a random percentage of 5. If the result is equal to or greater than LastLogonTimeStamp the attribute is updated. For example, the value of the
ms-DS-Logon-Time-Sync-Interval is 14 days, currently the user logon to the domain, X equals to (14 (Random percentage of 5)) and Y equals to (Current data value of LastLogonTimeStamp), this attribute is updated if X equals to or is smaller than Y, otherwise the attribute is not updated. Therefore, its expected that the LastLogonTimeStamp will be 9-14 days behind the date the user logins.

Interactive logon contains remote desktop logon and console logon, users need to press CTRL+ALT+DEL to type their credential and the credential is sent to domain controller for authentication.

Network Logon usually means logon from network, for example, a user logins to one workstation and accesses a shared folder on file server, the file server will treat the folder access process as network logon, there is a Security event log 4624 in file server and logon type is 3(network logon).

Yes, each domain computer changes machine account password every 30 days(default value), this can be changed via group policy, pwdlastset attribute on computer account is updated after machine account password changes, it's not related to attribute Lastlogontimestamp at all.

Regards,

Diana

June 14th, 2013 12:48pm

Once the computer authenticate to AD, that includes when the computer boots/starts as it auth with AD, and when the current kerberos ticket expire 10h (http://msdn.microsoft.com/en-us/library/ff649429.aspx) and when the password for the secure channel i
Free Windows Admin Tool Kit Click here and download it now
June 19th, 2013 6:24am

When machine account password changes, PwdLastSet attribute is modified and its value equals to the time that password is changed. Whether or not the lastlogontimestamp attribute is updated is nothing with Pwdlastset attribute.

Regards,

Diana

June 19th, 2013 10:30am

When machine account password changes, PwdLastSet attribute is modified and its value equals to the time that password is changed. Whether or not the lastlogontimestamp attribute is updated is nothing with Pwdlastset attribute.

Regards,

Free Windows Admin Tool Kit Click here and download it now
June 20th, 2013 5:07am

No, changing password does not update the LastLogonTimeStamp attribute, it is changed based on (given 14 - 5 rule) at any time. LastLogon attribute is changed each time the machine authenticates to AD.

Regards,

Diana

June 20th, 2013 1:16pm

To clarify what you are saying, during the password change no machine authentication takes place?
Free Windows Admin Tool Kit Click here and download it now
June 21st, 2013 6:12am

Machine authentication takes place when password changes, but the LastLogonTimeStamp attribute is not updated every time machine password changes.

Regards,

Diana

July 4th, 2013 5:57am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics