Solved

Log LDAP queries

Posted on 2014-03-07
3
447 Views
Last Modified: 2014-03-31
I would like to log all LDAP queries to a domain controller over a 24h period. What's the best approach? I'm looking for the content of the queries, not just the source.
0
Comment
Question by:albatros99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Accepted Solution

by:
eSourceONE earned 500 total points
ID: 39912621
You could use portmirroring and tools like wireshark to monitor traffic on LDAP port 389.
This will only monitor the unencrypted traffic though. If your clients / software use LDAP over SSL you will see traffic on port 636 but won't be able to see the contents.

You should also read this:
http://technet.microsoft.com/en-us/library/dd408940%28v=ws.10%29.aspx

and this:
http://technet.microsoft.com/en-us/library/cc961809.aspx

and see if you can get ADS to log the queries in the windows security logs.

Hope this helps.

Best regards,

Lars
0
 
LVL 1

Expert Comment

by:miller3773
ID: 39913802
Netmon from Microsoft will also work and you can isolate only LDAP traffic.
0
 
LVL 3

Author Comment

by:albatros99
ID: 39966525
I ended up changing the following two keys:

HKLM\System\CurrentControlSet\Services\NTDS\Diagnostics
"15 Field Engineering" set to 5 (default is 0)
 
HKLM\System\CurrentControlSet\Services\NTDS\Parameters\
Expensive Search Results Threshold:DWORD set to 1

The information ends up in the Directory Service Log.
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
A hard and fast method for reducing Active Directory Administrators members.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question