Solved

AD and DNS Logging

Posted on 2011-02-28
6
832 Views
Last Modified: 2012-05-11
How do I found out what IP addresses are authenticating to a Windows Server 2003 Domain Controller. I am retiring a Domain and need to verify how many machines are still actively logging into this Domain so that these users can be contacted prior to retiring. I turned on DNS Log Queries but this does not give me much.

Thanks!
0
Comment
Question by:Darrell Kirby
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 57

Expert Comment

by:Mike Kline
ID: 35002198
There are different logging levels you can look at  http://support.microsoft.com/kb/314980  or the security event logs

....but really you don't need to users don't need to do anything.  You updated their DNS server IPs (if those change) but the client (XP, 7, etc) is smart enough to pick another DC for authentication.

Thanks

Mike
0
 
LVL 31

Expert Comment

by:Justin Owens
ID: 35002262
Another suggestion would be to check Active Directory Sites and Services and see if there are any defined sites and subnets in AD.  Even then, that is a suggested server, not a "mandated only" server.  Mike is correct in that it should just be safe to remove.

DrUltima
0
 
LVL 11

Expert Comment

by:Renato Montenegro Rustice
ID: 35002916
Try raizing the net logon logging:

Enabling debug logging for the Net Logon service
http://support.microsoft.com/kb/109626

I usually use this to find out what ip addresses with no AD sites are logging to a domain controller (no modification to logging level is needed). Maybe you can do it by raizing the logging.

I'm wondering something. Maybe you can create an additional AD site. Then, do not associate any subnets to it. Move your domain controller to this new site. The log may start to show you what IP addresses are logging on your server.

Another clear choices would be to use tcpview, netmon or wireshark.
0
How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

 
LVL 7

Expert Comment

by:elawad
ID: 35004754
is the forward lookup zone of the retired domain still exists or you also deleted it, if its still exists the computers that are still joined to that domain will register themselves in the zone. and that is how you can check who is still on that domain. and if you delete it just recreate it and you should be fine.
0
 
LVL 3

Expert Comment

by:InterframeGap
ID: 35008314
I would look at using WMI or ADSI -

Many scripts at the scripting center which may help you here is the dhcp specific scripts:
http://gallery.technet.microsoft.com/scriptcenter/site/search?f%5B0%5D.Type=SearchText&f%5B0%5D.Value=dhcp&x=0&y=0

Read the information well and understand the scripts intentions and make sure that you are comfortable using the script in its current form.  If you have questions, the forum there is very good and well respected.

DMT
0
 
LVL 11

Accepted Solution

by:
Renato Montenegro Rustice earned 250 total points
ID: 35009857
I did the test. It seems to work just fine. Here is the step by step:

1) Raise the netlogon debug level in the domain controller:

nltest /dbflag:0x2080ffff

2) Restart the netlogon service in order to the flag take effect:

net stop netlogon && net start netlogon

3) Leave the flag for a period of time collecting the data. When you think it's enough, just turn it off and restart the netlogon:

nltest /dbflag:0x0
net stop netlogon && net start netlogon

----------------------

Ok, you can inspect the netlogon file while the logging is running or after some hours. You pick.

To summarize the results, run a findstr to collect only the authentication:

findstr -l "NetrServerAuthenticate returns Success" C:\Windows\Debug\netlogon.log > auths.txt

You can now open this txt in Excel and filter the data (extract the computer names, eliminate the duplicates, etc).

See if that works for you.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
In-place Upgrading Dirsync to Azure AD Connect
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question