Solved

AD and DNS Logging

Posted on 2011-02-28
6
813 Views
Last Modified: 2012-05-11
How do I found out what IP addresses are authenticating to a Windows Server 2003 Domain Controller. I am retiring a Domain and need to verify how many machines are still actively logging into this Domain so that these users can be contacted prior to retiring. I turned on DNS Log Queries but this does not give me much.

Thanks!
0
Comment
Question by:Darrell Kirby
6 Comments
 
LVL 57

Expert Comment

by:Mike Kline
Comment Utility
There are different logging levels you can look at  http://support.microsoft.com/kb/314980  or the security event logs

....but really you don't need to users don't need to do anything.  You updated their DNS server IPs (if those change) but the client (XP, 7, etc) is smart enough to pick another DC for authentication.

Thanks

Mike
0
 
LVL 31

Expert Comment

by:DrUltima
Comment Utility
Another suggestion would be to check Active Directory Sites and Services and see if there are any defined sites and subnets in AD.  Even then, that is a suggested server, not a "mandated only" server.  Mike is correct in that it should just be safe to remove.

DrUltima
0
 
LVL 11

Expert Comment

by:Renato Montenegro Rustice
Comment Utility
Try raizing the net logon logging:

Enabling debug logging for the Net Logon service
http://support.microsoft.com/kb/109626

I usually use this to find out what ip addresses with no AD sites are logging to a domain controller (no modification to logging level is needed). Maybe you can do it by raizing the logging.

I'm wondering something. Maybe you can create an additional AD site. Then, do not associate any subnets to it. Move your domain controller to this new site. The log may start to show you what IP addresses are logging on your server.

Another clear choices would be to use tcpview, netmon or wireshark.
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 7

Expert Comment

by:elawad
Comment Utility
is the forward lookup zone of the retired domain still exists or you also deleted it, if its still exists the computers that are still joined to that domain will register themselves in the zone. and that is how you can check who is still on that domain. and if you delete it just recreate it and you should be fine.
0
 
LVL 3

Expert Comment

by:InterframeGap
Comment Utility
I would look at using WMI or ADSI -

Many scripts at the scripting center which may help you here is the dhcp specific scripts:
http://gallery.technet.microsoft.com/scriptcenter/site/search?f%5B0%5D.Type=SearchText&f%5B0%5D.Value=dhcp&x=0&y=0

Read the information well and understand the scripts intentions and make sure that you are comfortable using the script in its current form.  If you have questions, the forum there is very good and well respected.

DMT
0
 
LVL 11

Accepted Solution

by:
Renato Montenegro Rustice earned 250 total points
Comment Utility
I did the test. It seems to work just fine. Here is the step by step:

1) Raise the netlogon debug level in the domain controller:

nltest /dbflag:0x2080ffff

2) Restart the netlogon service in order to the flag take effect:

net stop netlogon && net start netlogon

3) Leave the flag for a period of time collecting the data. When you think it's enough, just turn it off and restart the netlogon:

nltest /dbflag:0x0
net stop netlogon && net start netlogon

----------------------

Ok, you can inspect the netlogon file while the logging is running or after some hours. You pick.

To summarize the results, run a findstr to collect only the authentication:

findstr -l "NetrServerAuthenticate returns Success" C:\Windows\Debug\netlogon.log > auths.txt

You can now open this txt in Excel and filter the data (extract the computer names, eliminate the duplicates, etc).

See if that works for you.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

I've written instructions for one router type, but this principle may be useful for others of the same brand and even other brands of router. Problem: I had an issue especially with mobile devices that refused to use DNS information supplied via…
Resolve DNS query failed errors for Exchange
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now