?
Solved

Active Directory OU Restructuring:  Need Discovery Methods

Posted on 2014-02-20
4
Medium Priority
?
162 Views
Last Modified: 2014-11-11
I am working on a new OU structure for an existing infrastructure; it will actually move all of the existing objects into a new ROOTOU OU.  I am thinking on logical ways to discover what apps/devices are making calls to specific DNs so we can reach out to the appropriate parties to change them.   If anyone knows of ways to do this the only thing I can think of is running a network monitor on my DCs for a week or so and then going through LDAP traffic.  Just testing it for a few minutes I see that it is going to create a WHOLE lot of capture data to sift through and seems like it will be overwhelming.
0
Comment
Question by:mcburn13
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 4

Expert Comment

by:MMe12
ID: 39876152
There is a product from Quest (now Dell Software Group) called
"Change Auditor for Active Directory Queries"
http://www.quest.com/changeauditor-for-active-directory-queries

This should be much easier than network monitoring!
0
 
LVL 1

Author Comment

by:mcburn13
ID: 39906931
This looks great. I am going to keep this one on hold and report back with my findings on it...
0
 
LVL 1

Accepted Solution

by:
mcburn13 earned 0 total points
ID: 40426722
Change Auditor looks good but it really doesn't give any insight into the apps- really kind of tough but it is just a matter of communicating with colleagues and letting them know the changes are happening and to re-home their apps. I know Dynamic Distribution Lists will be an issue so will prepare the messaging team or figure out a way to script the changes for them
0
 
LVL 1

Author Closing Comment

by:mcburn13
ID: 40434572
no answer given- probably not really a viable way to do this
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question