Solved

Active Directory OU Restructuring:  Need Discovery Methods

Posted on 2014-02-20
4
157 Views
Last Modified: 2014-11-11
I am working on a new OU structure for an existing infrastructure; it will actually move all of the existing objects into a new ROOTOU OU.  I am thinking on logical ways to discover what apps/devices are making calls to specific DNs so we can reach out to the appropriate parties to change them.   If anyone knows of ways to do this the only thing I can think of is running a network monitor on my DCs for a week or so and then going through LDAP traffic.  Just testing it for a few minutes I see that it is going to create a WHOLE lot of capture data to sift through and seems like it will be overwhelming.
0
Comment
Question by:mcburn13
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 4

Expert Comment

by:MMe12
ID: 39876152
There is a product from Quest (now Dell Software Group) called
"Change Auditor for Active Directory Queries"
http://www.quest.com/changeauditor-for-active-directory-queries

This should be much easier than network monitoring!
0
 
LVL 1

Author Comment

by:mcburn13
ID: 39906931
This looks great. I am going to keep this one on hold and report back with my findings on it...
0
 
LVL 1

Accepted Solution

by:
mcburn13 earned 0 total points
ID: 40426722
Change Auditor looks good but it really doesn't give any insight into the apps- really kind of tough but it is just a matter of communicating with colleagues and letting them know the changes are happening and to re-home their apps. I know Dynamic Distribution Lists will be an issue so will prepare the messaging team or figure out a way to script the changes for them
0
 
LVL 1

Author Closing Comment

by:mcburn13
ID: 40434572
no answer given- probably not really a viable way to do this
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question