Tracking Kerberos Authentication Events to Workstations

Kerberos authentication events don't include workstation names, but they do provide enough information for you to determine which workstation generated the event.

ITPro Today

July 26, 2004

1 Min Read
ITPro Today logo in a gray background | ITPro Today

I'm trying to track down security violations that are originating within our network. I can tell that someone is using compromised accounts, but I can't connect those accounts to particular workstations or users. I've read that when a Windows 2000 domain controller (DC) logs authentication events, the DC can't record the workstation name if the Kerberos authentication protocol was used. All our computers are Win2K or later, so all our authentication takes place through Kerberos. How can I determine the name of the workstation being used to violate security?

When you enable the Audit account logon events audit category on Win2K DCs, Kerberos events don't include the workstation name. However, they do include the client IP address, as Figure 1 shows. You need to track down the IP address in your DHCP server logs to find the MAC address, then use it to find the computer. For details on how to use DHCP server logs, see Ask the Experts, "Differentiating Event ID 530 Logon Failures," September 2003, InstantDoc ID 39773.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like