Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Kerberos logs analysing and monitoring

Posted on 2010-09-03
2
Medium Priority
?
822 Views
Last Modified: 2013-12-07
Hello,

do you know any free OSS software for analysing the MIT Kerberos logs, mainly authentication - who has logged in and when, who has logged out and when. It would be good to have some statistical data about logins (average number of logins per day and similar).
0
Comment
Question by:pawwa
2 Comments
 
LVL 3

Accepted Solution

by:
acmeoil earned 1500 total points
ID: 33635938
Hello,
 Natively Linux has log files for the Kerberos, you could probably write a script to search the log files for a given text string (logons and such) and via a cron job use sendmail to email the results to you.

 Another alternative if you only wanted to do statistical analysis is to use something like Wireshark then perform a search on the output of that data. You also could integrate the MIT Kerberos with Active Directory then log it through Windows (I know who wants to do that!!! But it is an option)

 Last here are some sites that may be of assistance in general to you.

http://www.linux.com/learn/docs/ldp/574-Kerberos-Infrastructure-HOWTO

Or you could try Kerberos monitor from SolarWinds (Not cheap though)
https://support.ipmonitor.com/helps/54a6d1298c944b8a93731e76acbfb1df.aspx

0
 
LVL 4

Author Closing Comment

by:pawwa
ID: 34162391
^ Not exactly a complete and accurate answer that I was looking for, but anyway thank you. B.

I have found some nice tools for log analysis such as Splunk, but I will write my own solution at the end.
0

Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it'…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question