How to find out time spent in login

Posted on 2011-09-16
Medium Priority
Last Modified: 2012-05-12

We have a web application that uses the windows nt authentication on IIS 6.0 (windows 2003). We notice that before the application loads it takes a good 7-8 seconds and we suspect that the main bottleneck can be the NT authentication process

Can someone suggest some ideas how to confirm this and what free tools can be used for this.

Also can someone explain to me or point to me a diagram of NTLM Authentication

Question by:anshuma

Accepted Solution

Andrew Cliff earned 1000 total points
ID: 36548243

Assisted Solution

djpazza earned 1000 total points
ID: 36548629
Have you tried switching to anonymous and see if the problem still occurs?

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Sometimes it necessary to set special permissions on user objects.  For instance when using a Blackberry server, the SendAs permission needs to be set. I see many admins struggle with the setting that permission only to see it disappear within a few…
You have missed a phone call. The number looks like it belongs to the bunch of numbers which your company uses. How to find out who has just called you?
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

588 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question