?
Solved

Active Directory OU Restructuring:  Need Discovery Methods

Posted on 2014-02-20
4
Medium Priority
?
159 Views
Last Modified: 2014-11-11
I am working on a new OU structure for an existing infrastructure; it will actually move all of the existing objects into a new ROOTOU OU.  I am thinking on logical ways to discover what apps/devices are making calls to specific DNs so we can reach out to the appropriate parties to change them.   If anyone knows of ways to do this the only thing I can think of is running a network monitor on my DCs for a week or so and then going through LDAP traffic.  Just testing it for a few minutes I see that it is going to create a WHOLE lot of capture data to sift through and seems like it will be overwhelming.
0
Comment
Question by:mcburn13
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 4

Expert Comment

by:MMe12
ID: 39876152
There is a product from Quest (now Dell Software Group) called
"Change Auditor for Active Directory Queries"
http://www.quest.com/changeauditor-for-active-directory-queries

This should be much easier than network monitoring!
0
 
LVL 1

Author Comment

by:mcburn13
ID: 39906931
This looks great. I am going to keep this one on hold and report back with my findings on it...
0
 
LVL 1

Accepted Solution

by:
mcburn13 earned 0 total points
ID: 40426722
Change Auditor looks good but it really doesn't give any insight into the apps- really kind of tough but it is just a matter of communicating with colleagues and letting them know the changes are happening and to re-home their apps. I know Dynamic Distribution Lists will be an issue so will prepare the messaging team or figure out a way to script the changes for them
0
 
LVL 1

Author Closing Comment

by:mcburn13
ID: 40434572
no answer given- probably not really a viable way to do this
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Suggested Courses
Course of the Month13 days, 13 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question