Solved

Kerberos logs analysing and monitoring

Posted on 2010-09-03
2
789 Views
Last Modified: 2013-12-07
Hello,

do you know any free OSS software for analysing the MIT Kerberos logs, mainly authentication - who has logged in and when, who has logged out and when. It would be good to have some statistical data about logins (average number of logins per day and similar).
0
Comment
Question by:pawwa
2 Comments
 
LVL 3

Accepted Solution

by:
acmeoil earned 500 total points
ID: 33635938
Hello,
 Natively Linux has log files for the Kerberos, you could probably write a script to search the log files for a given text string (logons and such) and via a cron job use sendmail to email the results to you.

 Another alternative if you only wanted to do statistical analysis is to use something like Wireshark then perform a search on the output of that data. You also could integrate the MIT Kerberos with Active Directory then log it through Windows (I know who wants to do that!!! But it is an option)

 Last here are some sites that may be of assistance in general to you.

http://www.linux.com/learn/docs/ldp/574-Kerberos-Infrastructure-HOWTO

Or you could try Kerberos monitor from SolarWinds (Not cheap though)
https://support.ipmonitor.com/helps/54a6d1298c944b8a93731e76acbfb1df.aspx

0
 
LVL 4

Author Closing Comment

by:pawwa
ID: 34162391
^ Not exactly a complete and accurate answer that I was looking for, but anyway thank you. B.

I have found some nice tools for log analysis such as Splunk, but I will write my own solution at the end.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question