I ended up using a logon script that captures the volatile environment registry keys and dumps them to various TXT logs on a share to track user logons, etc.
↧
I ended up using a logon script that captures the volatile environment registry keys and dumps them to various TXT logs on a share to track user logons, etc.