[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Kerberos logs analysing and monitoring

Posted on 2010-09-03
2
Medium Priority
?
819 Views
Last Modified: 2013-12-07
Hello,

do you know any free OSS software for analysing the MIT Kerberos logs, mainly authentication - who has logged in and when, who has logged out and when. It would be good to have some statistical data about logins (average number of logins per day and similar).
0
Comment
Question by:pawwa
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
acmeoil earned 1500 total points
ID: 33635938
Hello,
 Natively Linux has log files for the Kerberos, you could probably write a script to search the log files for a given text string (logons and such) and via a cron job use sendmail to email the results to you.

 Another alternative if you only wanted to do statistical analysis is to use something like Wireshark then perform a search on the output of that data. You also could integrate the MIT Kerberos with Active Directory then log it through Windows (I know who wants to do that!!! But it is an option)

 Last here are some sites that may be of assistance in general to you.

http://www.linux.com/learn/docs/ldp/574-Kerberos-Infrastructure-HOWTO

Or you could try Kerberos monitor from SolarWinds (Not cheap though)
https://support.ipmonitor.com/helps/54a6d1298c944b8a93731e76acbfb1df.aspx

0
 
LVL 4

Author Closing Comment

by:pawwa
ID: 34162391
^ Not exactly a complete and accurate answer that I was looking for, but anyway thank you. B.

I have found some nice tools for log analysis such as Splunk, but I will write my own solution at the end.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question