Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 3314
  • Last Modified:

dns scavenging logging

I get the following event log information.  Is there a log I can open to see what records have been scavenged?  Thanks in advance.

The DNS server has completed a scavenging cycle:
Visited Zones     = 21,
Visited Nodes     = 1110,
Scavenged Nodes   = 55,
Scavenged Records = 49.
 
This cycle took 0 seconds.
0
escreen
Asked:
escreen
  • 8
  • 7
  • 5
  • +1
2 Solutions
 
BatchVCommented:
What version of server are you running?
0
 
escreenAuthor Commented:
Server 2003.
0
 
Chris DentPowerShell DeveloperCommented:

You could increase the level of audit logging, catch changes to the dnsTombstoned property for objects in your DNS zone. That'll log entries to the Security Log (if you have Audit Logging enabled in policy). It will not be entirely clear though, certainly not a nice concise list.

Chris
0
Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

 
BatchVCommented:
You could edit the registery to log all events in DNS. Link below gives details
http://technet.microsoft.com/en-us/library/cc782080(WS.10).aspx
0
 
Rich WeisslerProfessional Troublemaker^h^h^h^h^hshooterCommented:
@BatchV -- increasing the logging of events to include information only provides the summary information.  The 2501 message reported by the user is already an Information level message.  (The best additional logging I thought might include the level of detail the user is looking for might be Debug Logging -- but my servers are all handing tens to hundreds of thousands of requests per hour, and I'm nervous turning on THAT level of debugging.)
0
 
BatchVCommented:
Apart from this I don't really think you have much choice with this issue.
0
 
escreenAuthor Commented:
The DNS server is already set to log all events and I do not see any information in the logs about scavenging.  Really seems wierd that Microsoft would tell you how many nodes it scavenged and not log that information anywhere...  Any other ideas?

The reason why I want to find this out is that I have had some DNS entries disappeard and the only thing I can think of that may have removed them is scavenging.

Thanks!
0
 
Chris DentPowerShell DeveloperCommented:

Maybe you could just pull a list of records using the LDAP Filter (dnsTombstoned=TRUE)?

Given that "deleted" records are kept in that state for 14 days (by default, defined by dsTombstoneInterval) you won't find there's much more than the most recently deleted set listed.

That would fairly trivially tell you what was deleted if not when.

Chris
0
 
BatchVCommented:
I agree with Chris-Dent LDAP filter can provide you with some of the details
0
 
escreenAuthor Commented:
I would agree that it tell me what has been deleted, but the problem is that would still not tell what deleted it.  It would not differentiate between a person manually deleted a record and the scanvenging process deleting a record.  Do you agree or am I missing something?

I know that I have missing DNS records at this point, I need to find out what deleted them.

Thanks.
0
 
BatchVCommented:
to delete manually you would need domain administrators rights.
0
 
escreenAuthor Commented:
Yes, or delegated rights. I am not sure where you are going with that though.
0
 
Rich WeisslerProfessional Troublemaker^h^h^h^h^hshooterCommented:
@escreen -- I think it boils down to -- "No, there isn't an additional log that can be opened to view more details about what actions dns scavenger has taken."  I believe what folks are attempting to provide are alternate methods of obtaining similar information from other sources.
0
 
Chris DentPowerShell DeveloperCommented:

Start off with the basics. Were these records for servers that ordinarily register dynamically?

If so, are you certain that they *are* registering and refreshing themselves correctly? Check they register in the first place with "ipconfig /registerdns", check the DHCP Client is running (it must be, despite the service name), and check your systems DNS server settings. If those check out, check the Aging intervals, less than 24 hours on the Refresh Interval and you'll see this happen on occasion.

If they are static records you can immediately rule out Scavenging and you're left with bugs (such a zone corruption), or, more likely, user error. You won't catch that retroactively, you'd need auditing enabled in advance.

Chris
0
 
escreenAuthor Commented:
Thanks Razmus, that is really what I am looking for to be honest.

They are statically entered DNS entries and should not have been removed by Scavenging, but that does not mean that they weren't.  There are not many administrators that have the ability to remove these entries so I do not think it was user error, but that does not mean that it wasn't.  We did not loose that whole zone, so I do not think it is corruption.

I guess I will just enable auditing and hope it gives me the information I need to narrow this down more.

Thanks.
0
 
escreenAuthor Commented:
Answer does answer my question but does not solve my problem.
0
 
Chris DentPowerShell DeveloperCommented:
> Scavenging, but that does not mean that they weren't.  

It does, but I'll conceed that the operation of the scavenging process is a black box, claiming absolute certainty there is difficult. Statically added entries get a TimeStamp value of 0, the scavenging process explicitly ignores records with a TimeStamp value of 0.

Unfortunately, the change to deleted state for the record wipes out most of the dnsRecord attribute, making it impossible to determine what timestamp (if any) was set on the record immediately prior to deletion. It's the change to dnsRecord that makes the record invisible within the zone, the object still exists in the directory.

Briefly touching on corruption, this can occur when conflicting objects exist in Active Directory. This isn't always obvious, and rarely means that everything in the zone is corrupt. If this occurs again I urge you to check using ADSIEdit, conflicts will be prefixed with CNF:. Or you might check anyway, not a big or risky task.

I did think of one more. It is possible for a static record to be overwritten by a dynamic one, although I consider it to be unlikely than the other two options. For that to happen a number of conditions have to be true:

 - DHCP updating DNS for clients
 - DHCP is running on a DC without defined credentials or DHCP is running and using credentials of a privileged account to update (both are bad)
 - Someone logs a computer onto the network with the same name and DNS suffix as the removed name

I'm sure you can see why I believe it to be unlikely, there are a lot of conditions there. But it's worth considering if you're clutching at straws :)

In the end, enabling auditing is the best bet if you're worried about this happening again. I would try watching for changes to the dnsTombstoned property (rather than trying to catch delete, or similar), you should check that change flags a username in the security log when a record is removed.

Chris
0
 
Chris DentPowerShell DeveloperCommented:
escreen,

Do note that by setting a grade of C for this you are effectively blaming us for the design of the DNS system by MS. Each of us attempted to provide you with help and support within the constraints of the system. Assigning us a grade C on that basis is really quite rude.

Chris
0
 
escreenAuthor Commented:
Oh, I thought that was average... Sorry...  LOL...  I did not know C was bad...  My bad.
0
 
Chris DentPowerShell DeveloperCommented:
Usage of the grades is defined here:

http://www.experts-exchange.com/help.jsp#hs=29&hi=403

And the scenario this falls under here:

http://www.experts-exchange.com/help.jsp#hs=29&hi=405

If you feel it prudent I would push for a change to the grade, mainly because I don't like seeing C's in my history ;)

http://www.experts-exchange.com/help.jsp#hs=29&hi=404

Chris
0
 
escreenAuthor Commented:
I submitted the request, hopefully they will change it.  Thanks anyhow for the help.
0
 
Chris DentPowerShell DeveloperCommented:

No worries, hopefully next time we'll be able to provide something more constructive :)

Chris
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Get 10% Off Your First Squarespace Website

Ready to showcase your work, publish content or promote your business online? With Squarespace’s award-winning templates and 24/7 customer service, getting started is simple. Head to Squarespace.com and use offer code ‘EXPERTS’ to get 10% off your first purchase.

  • 8
  • 7
  • 5
  • +1
Tackle projects and never again get stuck behind a technical roadblock.
Join Now