Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Find incoming DNS queries by source ip address/hostname

Posted on 2011-02-20
3
Medium Priority
?
695 Views
Last Modified: 2012-05-11
Hello Experts,

I am planning to migrate my domain controller from windows 2003 to 2008 R2. I installed a  new 2008 DC with AD integrated DNS and moved FSMO roles to the new server. I want to decommision the old win 2003 domain controller now. I already configured DHCP scopes to look for the new 2008 server for the DNS lookup. Still i bellive that there are some static devices point back to my old win 2003 DC. How do i find out the incoming requests from these static devices to the old 2003 server so that i can make changes accordingly.
My thoughts are using wireshark (similar tools) to log the incoming DNS requests? or i can use windows DNS server logging?

Is there a better way to deal with this issue?

Gil
0
Comment
Question by:gilbertinigo
2 Comments
 
LVL 125

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 34939457
You can use both Wireshark and DNS logging, ensure Wireshark is installed on the DNS server.

Wireshark is easier. Because you can setup a filter, leave for 48 - 72 hours, come back and look at the logs, resolve hostnames, and then go and tell the admins of their servers.!
0
 
LVL 26

Expert Comment

by:Pber
ID: 37398721
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Get your problem seen by more experts

Be seen. Boost your question’s priority for more expert views and faster solutions

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
Sometimes it necessary to set special permissions on user objects.  For instance when using a Blackberry server, the SendAs permission needs to be set. I see many admins struggle with the setting that permission only to see it disappear within a few…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

572 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question